Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe
-
Size
278KB
-
MD5
314715dcbca0913723e739baaaa3625c
-
SHA1
ed76fa4ce9dc52c5afb901c4ab345d63e5bfc707
-
SHA256
f84968f645af4f60db915211f8d5c4189b8a31652cb14f4d48b91512b74b952a
-
SHA512
4b6fb47dd3b4a3f67f04e6270247a5e601d0577878c8a508e5ada93fd973625055b29c87c279306cec143a68335b7b76eb366e519f9c5a5dd57c30d6dae4798d
-
SSDEEP
6144:sZ9hTZH/ajlyttk6e4L0dkXwzNiygWarVJfWy6NIRhkPGp6:gTZsJaX8NJarVJINIRA
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023473-4.dat family_gh0strat behavioral2/memory/1080-11-0x0000000000400000-0x0000000000436000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1080 3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3064 4748 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4748 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 4748 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1080 4748 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 83 PID 4748 wrote to memory of 1080 4748 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 83 PID 4748 wrote to memory of 1080 4748 314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- Executes dropped EXE
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 15762⤵
- Program crash
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4748 -ip 47481⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD57509bbcffe8ddcc106643d0633c6b6d6
SHA1a5d4999500270e15ede696699d34c123bde74758
SHA2565dd3815e0abb91624d8c3bb8bb9aa3044a78c841f61f8606cad67be008f22a0b
SHA5123f913b31145bdabd773cbdf0c98d1c4266a57664a77db5b9cc00c34d6a5b6b54eb7a7c9e1b16a334703526265036d8858f4d9ed8bc0f4ab7e1c7afd5653200a9