Analysis

  • max time kernel
    133s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 09:44

General

  • Target

    6f0fc8a80dfd97b650a02c0b0ead60b9_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    6f0fc8a80dfd97b650a02c0b0ead60b9

  • SHA1

    d654e296f3512b0deb4f10ca83ae67ed9028f415

  • SHA256

    996bb3b38dde333de4c5e92da3f5a459fdf76e431964205041141ea65b86d48a

  • SHA512

    9db721c55f079e6911e1208034a6b572878d4f1355f905a0c4f5b32eba60b39e6a63737cfb0db8d11e108ef595b901c1b6e46f77a7d499f6bce9f9a767b86905

  • SSDEEP

    3072:ZqFRwVCnWRcdPhLg8eqxWQq/gd6qSfe+y5LiZGXE73iHPZdQ+0K6KuCPPPPPn:aqVCnWRclhLGZsd6qSfe+y5LiMXciHP0

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0fc8a80dfd97b650a02c0b0ead60b9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0fc8a80dfd97b650a02c0b0ead60b9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1660
    • \??\c:\users\admin\appdata\local\gjmevuhpbe
      "C:\Users\Admin\AppData\Local\Temp\6f0fc8a80dfd97b650a02c0b0ead60b9_JaffaCakes118.exe"a -sc:\users\admin\appdata\local\temp\6f0fc8a80dfd97b650a02c0b0ead60b9_jaffacakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2520
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\program files (x86)\%sessionname%\dntft.cc3

    Filesize

    21.1MB

    MD5

    81022ee678ad135cc972a5c3df5b3439

    SHA1

    5f0664605168f39b6f73b75afe1890bff1d4d061

    SHA256

    67ecbbd47c77457a384c0d5cdbdab57dd74e58f9eed9895873c3ac92e7f71a4c

    SHA512

    4b55caf910f3f8365771300d74d545d108691edd77fbbffeeb70001aec0ac7270676d41d098f77972389a7de150da9effd7887d11f5bd508cdecc93ed48559ec

  • \Users\Admin\AppData\Local\gjmevuhpbe

    Filesize

    20.3MB

    MD5

    0384ecafbb6c8f26975b0f0ff725c380

    SHA1

    db1657b23f8cd3eda1e5550a83eb4d26b44e8438

    SHA256

    1075d1d729c068041c1aace07a265cae19f117c6352fabffd2bb3db2b3fc8a4e

    SHA512

    a9cb03861ec36d9b0e0fcb569030c8a535a564c810cfd383ea017136cb3c2e298607b4d268fe3303dac7ab3b3763fd2227e4e99015c1df81e94ba0e2fb3a3481

  • memory/400-13-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB