Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 03:17

General

  • Target

    6a0d447e4df946ca11d280ecdd7633c6_JaffaCakes118.exe

  • Size

    95KB

  • MD5

    6a0d447e4df946ca11d280ecdd7633c6

  • SHA1

    198ce948e6d25ef67ca0f959672c2cf8f81b1e38

  • SHA256

    3990e73698873edc23c24fa38957e9c1a2c5fdf2b598e02b6fcaad5b65e1d7ee

  • SHA512

    72f1357c8dc176aa059a674e20de25a9f14f5b72cf997553f10fe43103e0cbcbb31af9a7c131cec5b8706d6c1b202e01cf57febe9086c9a68a60a9706748c737

  • SSDEEP

    1536:N73XFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prCRiik+:NThS4jHS8q/3nTzePCwNUh4E9qVk+

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a0d447e4df946ca11d280ecdd7633c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6a0d447e4df946ca11d280ecdd7633c6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2088
    • \??\c:\users\admin\appdata\local\fmrjcrorgm
      "C:\Users\Admin\AppData\Local\Temp\6a0d447e4df946ca11d280ecdd7633c6_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\6a0d447e4df946ca11d280ecdd7633c6_jaffacakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3048
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2508

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\programdata\application data\storm\update\%sessionname%\kcovo.cc3

          Filesize

          24.0MB

          MD5

          226bbd181753e683163241223c43ad8e

          SHA1

          60723bd21d69fa2b0f80b1a770bc7b3e75308569

          SHA256

          e98de4414989a689698bc615f455a7b5e9e5fbeb705904688c33b27cad7fe85e

          SHA512

          2b44b6bdf88b6cae0e80155a99c6071ea64a6c1c151caa053be521bd16ce8dc8056e16345c9d0225c51546cd8ab39ae5409b7833e9d2ef111be40c1def007c2a

        • \Users\Admin\AppData\Local\fmrjcrorgm

          Filesize

          24.7MB

          MD5

          43e425554b0844accafcd405779896b1

          SHA1

          97eac741f19d8d8689d82eba877b452269d34a0d

          SHA256

          5e55ee5db105b52d52aa6cc1b2536658346a5229f4a2b4bf0d2ccd6528447dee

          SHA512

          da876d9ba127cf1aa358d5324ef618ca0eaf3288aa588299b6c6b698d5c31f22a66ca21849128cb84ab2e765b4538cd7a1b9b4a65d3ecf221e4fc41cf4797cda

        • memory/2088-0-0x0000000000400000-0x000000000044C611-memory.dmp

          Filesize

          305KB

        • memory/2088-3-0x0000000000230000-0x000000000027D000-memory.dmp

          Filesize

          308KB

        • memory/2088-2-0x0000000000230000-0x000000000027D000-memory.dmp

          Filesize

          308KB

        • memory/2088-7-0x0000000000450000-0x000000000049D000-memory.dmp

          Filesize

          308KB

        • memory/2088-12-0x0000000000400000-0x000000000044C611-memory.dmp

          Filesize

          305KB

        • memory/2508-22-0x0000000000140000-0x0000000000141000-memory.dmp

          Filesize

          4KB

        • memory/2508-23-0x0000000020000000-0x0000000020027000-memory.dmp

          Filesize

          156KB

        • memory/2508-25-0x0000000020000000-0x0000000020027000-memory.dmp

          Filesize

          156KB

        • memory/3048-13-0x0000000000400000-0x000000000044C611-memory.dmp

          Filesize

          305KB

        • memory/3048-21-0x0000000000400000-0x000000000044C611-memory.dmp

          Filesize

          305KB