Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe
-
Size
406KB
-
MD5
4ab89a72b156a32a2f2e920b1597028f
-
SHA1
73369b499b0b3a329a0ee61ba7e1bd2a9bbba167
-
SHA256
e1f5f89077793c78b2cf47e9005eac43c57fb8c9633054c83a15063edcaf01d5
-
SHA512
4cfd96282379442c37c1704eb47591429ed2039fef7456f33de3608996d043fc05e6d7122e215d2a40a4ad3163296001758e34050618667ce1423fadc8c1acd6
-
SSDEEP
6144:ocqtuJKCU6F2idZecnl20lHRxp3gHncduD7yB9VCO6Sco4q8+dE6CqIg:auJKCjF3Z4mxxQDqVTVOC/
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000015d39-45.dat family_gh0strat behavioral1/memory/1588-55-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys server1.exe File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys svchost.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityex.dll" server1.exe -
Executes dropped EXE 1 IoCs
pid Process 1588 server1.exe -
Loads dropped DLL 4 IoCs
pid Process 480 4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe 480 4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe 1588 server1.exe 1660 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilityex.dll server1.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 472 Process not Found 472 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 480 wrote to memory of 1588 480 4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe 28 PID 480 wrote to memory of 1588 480 4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe 28 PID 480 wrote to memory of 1588 480 4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe 28 PID 480 wrote to memory of 1588 480 4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4ab89a72b156a32a2f2e920b1597028f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server1.exe2⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1588
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in Drivers directory
- Loads dropped DLL
PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD58cdd1847b08155fc5a3ee084cd7209ea
SHA110c1970ccce553ee604abc7452cf22a0c47f8c61
SHA256d4f4034b7024663eb06e00797c83d1bf66bfa94006df6acb0f3eff7119d7fc62
SHA51299dbe5d893cb3cbe8038a1de993a99014724fa313c832c46a22e63bdee59de336675209417b42b479cb2e51af8d722530370848d8318bf079ec7f96444066b46
-
Filesize
56KB
MD53e9facdfe21f0a509672ef9337bea95e
SHA1a686475b7290434338d8f6297e0f70d459aac7b1
SHA256097ac62b8fad0ef8e6ca08ac04e43c020e37f9dfe09068d87dd90b4aa6e2af68
SHA51280c1435167d43b902458a3f9c9a71d6071b8d768df9d0eab1f7c9d34cdb17cb084e70d48542701e5d459b68f247e635a670a19aaf27636234cb5628f06d1a88c
-
Filesize
95KB
MD596e1c1ef9896d67cc5a0773b0e4440d8
SHA1b67225bb41f2d402fdf501b177571fc83e343ad8
SHA256f147cb6896332a26b01c473ee0ed0fc264fa24a26eeca2daae6a8fd720af65c9
SHA512485e8cfc807ecfae88116eb775c10eb740b8ad0529adeb9d391f4d54c5fba933dd87331c83db1ac57b3229469a8b791037d6fb9a555b15ad4a2f3b5528b2f616