Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe
-
Size
376KB
-
MD5
5a47e583dcc59f27cdbbec3faad0d503
-
SHA1
906d139fcd2492c3d11b009be9e9a48e293123f7
-
SHA256
083a84992dd3cfce97a869488d4b6cd1bc4717721decfe1bb5306436ff7b759c
-
SHA512
f81b02efc10506923e5cab1ca478f9181ece3fd844ac42efd3b5eeedb439a7eb2d990f28d5fe4203a931d10e2d3f5cc355a399e9e462fe7c5f45d6519896e934
-
SSDEEP
6144:zIHYsZbS31zXqSNQgeiOKnDYVH0pwpMWEmpRBJ1NuUBY+f7zAF11whggaoHofph2:zIVZel6SOgeiOKEVH0ppWfBJ7XBczmR5
Malware Config
Signatures
-
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral1/memory/2704-9-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2704-8-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2704-11-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2704-10-0x0000000000401000-0x0000000000468000-memory.dmp family_gh0strat behavioral1/memory/2704-7-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2832-24-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2832-27-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2832-26-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2832-23-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2832-22-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat behavioral1/memory/2704-31-0x0000000000400000-0x000000000054B000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2832 svchest000.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe" 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe File created \??\c:\Windows\BJ.exe 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe File created \??\c:\Windows\svchest000.exe 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe File opened for modification \??\c:\Windows\svchest000.exe 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2832 2704 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2832 2704 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2832 2704 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe 31 PID 2704 wrote to memory of 2832 2704 5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a47e583dcc59f27cdbbec3faad0d503_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\Windows\svchest000.exec:\Windows\svchest000.exe2⤵
- Executes dropped EXE
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
376KB
MD55a47e583dcc59f27cdbbec3faad0d503
SHA1906d139fcd2492c3d11b009be9e9a48e293123f7
SHA256083a84992dd3cfce97a869488d4b6cd1bc4717721decfe1bb5306436ff7b759c
SHA512f81b02efc10506923e5cab1ca478f9181ece3fd844ac42efd3b5eeedb439a7eb2d990f28d5fe4203a931d10e2d3f5cc355a399e9e462fe7c5f45d6519896e934