Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 09:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe
Resource
win7-20240704-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
9 signatures
150 seconds
General
-
Target
2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe
-
Size
80KB
-
MD5
2fc0e94d7bc3d1fd09222e2877d8bf6e
-
SHA1
de116760b56360667cff6c800e932d132e110234
-
SHA256
5934a25e94d412da8284fe8afdc962171a96488a568fd971b6bdc17961392559
-
SHA512
920d293bf4ea76f18d86b274c7e394ad040910b89aec3182027d76906a646691875b1a565e337308c408a17d235328a1b30e75e53410224204ea5e2cb4e58dbd
-
SSDEEP
1536:sFz0LnC0atiq+9Cc73McaTBFb0bJ+oa/xrpnHTlyojsjxNe22JjIHM:sFz90hq+Yc7Hf4oa5r5sojsj+oM
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/1648-2-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/1648-4-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/1648-7-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/1648-8-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\F0F7DF70 = "C:\\Windows\\F0F7DF70\\svchsot.exe" 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2104 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe 31 PID 1648 wrote to memory of 2104 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe 31 PID 1648 wrote to memory of 2104 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe 31 PID 1648 wrote to memory of 2104 1648 2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe 31 PID 2104 wrote to memory of 1952 2104 net.exe 33 PID 2104 wrote to memory of 1952 2104 net.exe 33 PID 2104 wrote to memory of 1952 2104 net.exe 33 PID 2104 wrote to memory of 1952 2104 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2fc0e94d7bc3d1fd09222e2877d8bf6e_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:1952
-
-