Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 19:37
Behavioral task
behavioral1
Sample
3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe
-
Size
127KB
-
MD5
3a783b67cb6a17b443ee9820946dda26
-
SHA1
2b714568d9b5b81d3f77be134983d7c5f06a345c
-
SHA256
408632ad84bc391103e20efc4e790c0a38e8f8631c438148fa52ad9a2727fcbb
-
SHA512
125b34a2ac981bae64e06f968c4d87e2e2130a4ab6cce52ce4cddf9fbbecf252fbbc197003fc8abeeae5517d5488a3446c724b7cfc4f171873e5b1ec9a9145da
-
SSDEEP
3072:7eJB5WpPCMtzFCi9k2ttBB0NoYu/kvi3WZg:7eL5BM1si9kQfSNt+ka0
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000b000000016d9e-5.dat family_gh0strat behavioral1/memory/3040-9-0x0000000010000000-0x0000000010029000-memory.dmp family_gh0strat behavioral1/files/0x0009000000012281-12.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 2772 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2772 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Rnop\Wnopqrstu.gif 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe File created C:\Program Files (x86)\Rnop\Wnopqrstu.gif 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 3040 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe Token: SeRestorePrivilege 3040 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe Token: SeBackupPrivilege 3040 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe Token: SeRestorePrivilege 3040 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe Token: SeBackupPrivilege 3040 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe Token: SeRestorePrivilege 3040 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe Token: SeBackupPrivilege 3040 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe Token: SeRestorePrivilege 3040 3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a783b67cb6a17b443ee9820946dda26_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2772
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD530c4d7a7cca3b8be32741bc8e8a955e9
SHA1b701502f528bef3fa0216ae68acefc5f35159d53
SHA25607acdef1b143098de6b02045c83821bc349e19093a3e187f029d6076d88d2d5c
SHA512e63c525093099793e60c231e7125e36cd0c8c3dd239d1f88d3171a5f3b3e55eed5fdff1b51080b10ee273475189e2c69ae66193a03013fad84d140ff19928b04
-
Filesize
16.5MB
MD5fedb9e7972cd71e7f024ed3bfb7c4cbd
SHA133a538a249d58e12b07b8a54c4fcac2f078305d1
SHA256947f799d35d7c22306b02b8d9780e602b80a9313790fd0dac851f0d7a0d772c2
SHA5126184420df40a39b51c532148f766abf3967a9c179faa245fb94fdc920d49ce8e6309e5273d82b4cfd897cbe78e34d6e90614d1d72546b0404868730de1ac5a0d
-
Filesize
99B
MD52d16bc4feae459a58f0e15ea169646b6
SHA15a14d69f7f2c9a03eb074b08bacc783a7eb8e411
SHA2569cae11aa018951483f34cedff9326fec9ce6091223cc717c250ae2125bf7a5f3
SHA5125c73b42f1d12b7324e52d1f48f3210aa2b68251959025aac5a717ce129b4707355e53d877b54cd8d36abb0779daa37c373f5be2e14d1da3150d197213ebe9cb7