Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe
-
Size
278KB
-
MD5
314715dcbca0913723e739baaaa3625c
-
SHA1
ed76fa4ce9dc52c5afb901c4ab345d63e5bfc707
-
SHA256
f84968f645af4f60db915211f8d5c4189b8a31652cb14f4d48b91512b74b952a
-
SHA512
4b6fb47dd3b4a3f67f04e6270247a5e601d0577878c8a508e5ada93fd973625055b29c87c279306cec143a68335b7b76eb366e519f9c5a5dd57c30d6dae4798d
-
SSDEEP
6144:sZ9hTZH/ajlyttk6e4L0dkXwzNiygWarVJfWy6NIRhkPGp6:gTZsJaX8NJarVJINIRA
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2708-5-0x00000000023E0000-0x0000000002416000-memory.dmp family_gh0strat behavioral1/files/0x0009000000012281-3.dat family_gh0strat behavioral1/memory/2320-12-0x0000000000240000-0x0000000000276000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2320 3.exe -
Loads dropped DLL 9 IoCs
pid Process 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 2320 3.exe 2320 3.exe 2320 3.exe 2740 WerFault.exe 2740 WerFault.exe 2740 WerFault.exe 2740 WerFault.exe 2740 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2740 2320 WerFault.exe 30 2748 2708 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2320 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2320 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2320 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2320 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2320 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2320 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 30 PID 2708 wrote to memory of 2320 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 30 PID 2320 wrote to memory of 2740 2320 3.exe 31 PID 2320 wrote to memory of 2740 2320 3.exe 31 PID 2320 wrote to memory of 2740 2320 3.exe 31 PID 2320 wrote to memory of 2740 2320 3.exe 31 PID 2320 wrote to memory of 2740 2320 3.exe 31 PID 2320 wrote to memory of 2740 2320 3.exe 31 PID 2320 wrote to memory of 2740 2320 3.exe 31 PID 2708 wrote to memory of 2748 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2748 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2748 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 32 PID 2708 wrote to memory of 2748 2708 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 2523⤵
- Loads dropped DLL
- Program crash
PID:2740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 9082⤵
- Program crash
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD57509bbcffe8ddcc106643d0633c6b6d6
SHA1a5d4999500270e15ede696699d34c123bde74758
SHA2565dd3815e0abb91624d8c3bb8bb9aa3044a78c841f61f8606cad67be008f22a0b
SHA5123f913b31145bdabd773cbdf0c98d1c4266a57664a77db5b9cc00c34d6a5b6b54eb7a7c9e1b16a334703526265036d8858f4d9ed8bc0f4ab7e1c7afd5653200a9