Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 08:38
Behavioral task
behavioral1
Sample
6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe
-
Size
114KB
-
MD5
6af2fcb0bf0c935490ad8e1d73d58841
-
SHA1
71d8e920bdfe7a62bf39d32868718e893a6bf75a
-
SHA256
8e437faea96a8f5da5ea300e9f2a8b0f63c2fe518e0ad03a6fb924194bca5e3a
-
SHA512
7e054b9c8dd94111d12b422169b9a8a9a4556d2e6597d07683af766eed8c7499e9b1234fed3c8560bac813a073d6068d726760a600c23c85be8b37072b3e0d6b
-
SSDEEP
1536:NvYjFMie2lLo2HFGabwVcy93f1VkZxGY3R2BjBOxLlm3C:BYCWcgFGUwVF9v1VkZwjjBOxLlgC
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000700000001211b-1.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1276 svchest24846.exe -
Loads dropped DLL 3 IoCs
pid Process 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\svchest24846.exe.ini svchest24846.exe File created C:\Program Files\Common Files\svchest24846.exe 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\svchest24846.exe 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchest24846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 2 IoCs
pid Process 1268 taskkill.exe 1156 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe 1276 svchest24846.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1156 taskkill.exe Token: SeDebugPrivilege 1268 taskkill.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2576 wrote to memory of 1156 2576 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1156 2576 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1156 2576 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1156 2576 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1156 2576 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1156 2576 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1156 2576 6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe 30 PID 1276 wrote to memory of 1268 1276 svchest24846.exe 33 PID 1276 wrote to memory of 1268 1276 svchest24846.exe 33 PID 1276 wrote to memory of 1268 1276 svchest24846.exe 33 PID 1276 wrote to memory of 1268 1276 svchest24846.exe 33 PID 1276 wrote to memory of 1268 1276 svchest24846.exe 33 PID 1276 wrote to memory of 1268 1276 svchest24846.exe 33 PID 1276 wrote to memory of 1268 1276 svchest24846.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6af2fcb0bf0c935490ad8e1d73d58841_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Program Files\Common Files\svchest24846.exe"C:\Program Files\Common Files\svchest24846.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD56af2fcb0bf0c935490ad8e1d73d58841
SHA171d8e920bdfe7a62bf39d32868718e893a6bf75a
SHA2568e437faea96a8f5da5ea300e9f2a8b0f63c2fe518e0ad03a6fb924194bca5e3a
SHA5127e054b9c8dd94111d12b422169b9a8a9a4556d2e6597d07683af766eed8c7499e9b1234fed3c8560bac813a073d6068d726760a600c23c85be8b37072b3e0d6b