Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 17:56

General

  • Target

    70a45b773f97181b3ff673067e20191e_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    70a45b773f97181b3ff673067e20191e

  • SHA1

    fa75998a454d0a073d3e31ccd6156fdc2042131e

  • SHA256

    2ccd7b5559156ec061007f77ae8030540c3637573b27b85456cf4b9dac0b1d70

  • SHA512

    96ccace15b7db704a108a18f6780f3dfea34feae467b1d043eb924e9b3870e388b9f9e428e2581bb2f08da4d0276bc6e9fcc1137e7736b3f32ed2f1939d2aac9

  • SSDEEP

    6144:2FgeYtUpy9FR1eTboMMzEZFRLZGsoozQ9bqe4d15O:GgeEUiL5za8k9e4I

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70a45b773f97181b3ff673067e20191e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\70a45b773f97181b3ff673067e20191e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Program Files\Common Files\alibao.exe
      "C:\Program Files\Common Files\alibao.exe" "C:\Program Files\Common Files\alibao.dll" ServiceMain
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files\Common Files\alihao.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Program Files\Common Files\alibao.VBS"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2988
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\Users\Admin\AppData\Local\Temp\70A45B~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\alibao.VBS

    Filesize

    1KB

    MD5

    116a7142bbe72653f8ea7c8a9a568c3b

    SHA1

    8149a7db5bd43bb51454e4ccb11a5a41ef6a7dde

    SHA256

    e41de1869ca1f14c4bdafbfadd7a769184014ceead652aeba326659368e6c695

    SHA512

    3e463fd656afe51c403afb002c43e27a5c3e3a52543691c648c3253b377ec2afa4bf237b29566341b350c0d4d0e4c90a092d779e7b557fb196888e7cf89abbc7

  • C:\Program Files\Common Files\alibao.dll

    Filesize

    24.1MB

    MD5

    35fef5d3310a03f3d3ff91bff4480ce6

    SHA1

    10341882b83d76caacd2b07124777393ee3bf588

    SHA256

    bb287040ed271ea6e0e48d8ac9ababcde3c1ad05ab205478a67b7303fcbe84a7

    SHA512

    27f7d4ba3c512487d71c5d428d93ca7b8b796452cca088870fefa3f6106057cf7dba3d9890ab0d879f7f144afd001a99c247d1c46bd4d327c5b5260d1112242b

  • C:\Program Files\Common Files\alihao.bat

    Filesize

    57B

    MD5

    1cdb9bcf58f9a3764fca74fb9f3fbfc3

    SHA1

    12bee8a9862242ed39d4316b11b4c568c778ba0b

    SHA256

    4fbd276e36e32db6ef3ba7d86d57c56b870575d76adcdcd82829acd8a7ccc950

    SHA512

    1bc9a5d46df7f91a7b36dd3050d034a43a67bf66cdf27b5f84ce5ed0542c5b51defabbd6c38408cc1e340b4fc26f652034ee19bd24d86d495d75e54a6497acc6

  • \Program Files\Common Files\alibao.exe

    Filesize

    43KB

    MD5

    51138beea3e2c21ec44d0932c71762a8

    SHA1

    8939cf35447b22dd2c6e6f443446acc1bf986d58

    SHA256

    5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

    SHA512

    794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

  • memory/2196-25-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/2932-7-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2932-4-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2932-3-0x0000000000260000-0x000000000029E000-memory.dmp

    Filesize

    248KB

  • memory/2932-5-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2932-0-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2932-8-0x00000000002C0000-0x00000000002C2000-memory.dmp

    Filesize

    8KB

  • memory/2932-26-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2932-28-0x0000000000260000-0x000000000029E000-memory.dmp

    Filesize

    248KB

  • memory/2932-2-0x0000000000260000-0x000000000029E000-memory.dmp

    Filesize

    248KB

  • memory/2932-37-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2932-35-0x0000000000260000-0x000000000029E000-memory.dmp

    Filesize

    248KB

  • memory/2932-1-0x0000000000240000-0x00000000002B2000-memory.dmp

    Filesize

    456KB