Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 22:06
Behavioral task
behavioral1
Sample
69212baf0fc835a22ba0eef258c48d79_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69212baf0fc835a22ba0eef258c48d79_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69212baf0fc835a22ba0eef258c48d79_JaffaCakes118.exe
-
Size
44KB
-
MD5
69212baf0fc835a22ba0eef258c48d79
-
SHA1
3e27902b0deb1784cd551456b1de1be5bb811602
-
SHA256
728b76d5ae70840edd246b5fbb72322794e9f9eed46e75963ed8404d858513a3
-
SHA512
571a292d81302b414682bd8fb0e9c6d73b80ef95eda9566bc125be61f98a929d8eafd55ee6c472d29a1f636fc94d08c8a0a18cb81137f0b08689d1d5adf45082
-
SSDEEP
768:iyJ6QD92jBmD8p8TLyD4G4r779cTyWHbGXMeCgjO7Ys47J9Pbls6n:nD9YBmDVTL39H79jWHbGMgjM4PPb
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000c00000001227f-1.dat family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Manager\Parameters\ServiceDll = "C:\\Windows\\system32\\Manager.dll" 69212baf0fc835a22ba0eef258c48d79_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2764 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 2764 svchost.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe 2776 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Manager.dll 69212baf0fc835a22ba0eef258c48d79_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69212baf0fc835a22ba0eef258c48d79_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2764 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2764 svchost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2776 2764 svchost.exe 31 PID 2764 wrote to memory of 2776 2764 svchost.exe 31 PID 2764 wrote to memory of 2776 2764 svchost.exe 31 PID 2764 wrote to memory of 2776 2764 svchost.exe 31 PID 2764 wrote to memory of 2776 2764 svchost.exe 31 PID 2764 wrote to memory of 2776 2764 svchost.exe 31 PID 2764 wrote to memory of 2776 2764 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\69212baf0fc835a22ba0eef258c48d79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69212baf0fc835a22ba0eef258c48d79_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1940
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\rundll32.exerundll32 "c:\windows\system32\manager.dll",run Manager2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18.1MB
MD5b348c7fe8debcf7b382344a060c0e2d3
SHA1e887184c5bc7f1220a5a97faed2752a127a1e497
SHA256683cd706e2a78bc2352622779aace8b172fa96ecb29216a3af2884886fe5eff1
SHA512fed28fe11ce7f58b416f46c7b7e42d6fb50e03d70adfc214e0edcfc1f8d74a0621b318a87ea3e80dbdaa005d0420100ca26208ca98318a3cf3a5d7ed0afe003a