Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 17:18

General

  • Target

    314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe

  • Size

    278KB

  • MD5

    314715dcbca0913723e739baaaa3625c

  • SHA1

    ed76fa4ce9dc52c5afb901c4ab345d63e5bfc707

  • SHA256

    f84968f645af4f60db915211f8d5c4189b8a31652cb14f4d48b91512b74b952a

  • SHA512

    4b6fb47dd3b4a3f67f04e6270247a5e601d0577878c8a508e5ada93fd973625055b29c87c279306cec143a68335b7b76eb366e519f9c5a5dd57c30d6dae4798d

  • SSDEEP

    6144:sZ9hTZH/ajlyttk6e4L0dkXwzNiygWarVJfWy6NIRhkPGp6:gTZsJaX8NJarVJINIRA

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\314715dcbca0913723e739baaaa3625c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Users\Admin\AppData\Local\Temp\3.exe
      "C:\Users\Admin\AppData\Local\Temp\3.exe"
      2⤵
      • Executes dropped EXE
      PID:1080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 1576
      2⤵
      • Program crash
      PID:3064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4748 -ip 4748
    1⤵
      PID:2888

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3.exe

      Filesize

      198KB

      MD5

      7509bbcffe8ddcc106643d0633c6b6d6

      SHA1

      a5d4999500270e15ede696699d34c123bde74758

      SHA256

      5dd3815e0abb91624d8c3bb8bb9aa3044a78c841f61f8606cad67be008f22a0b

      SHA512

      3f913b31145bdabd773cbdf0c98d1c4266a57664a77db5b9cc00c34d6a5b6b54eb7a7c9e1b16a334703526265036d8858f4d9ed8bc0f4ab7e1c7afd5653200a9

    • memory/1080-11-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4748-0-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/4748-12-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB