Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe
-
Size
192KB
-
MD5
74a0fb0e3ff8e93bf23b54818a5fda46
-
SHA1
706d44eb508ca1c4121459c1da8d328b98fa0e2b
-
SHA256
7351f766fb6d17f01154cea240704b351bc76a34108d3238b330d7a5bb0e1156
-
SHA512
4bfae519dccbbdbb9c9e571df61b3683d0fde5b3b1f063f323446644bcd474c80127c1445bebf262006fb236ccfbc8de384adac8fe683b8fb3146f4531554b3f
-
SSDEEP
3072:KhqLTH1JnWVch96O6V/Qk2WKdwQH/hnSI5+ulG3K97q7cOh3TS3y87wxqK/lGAOs:BfXnWVcKRzQdvHn3K/lGAONx3
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1048-4-0x0000000000400000-0x0000000000431000-memory.dmp family_gh0strat \??\c:\program files (x86)\%sessionname%\njvbn.xm family_gh0strat behavioral2/memory/4540-13-0x0000000010000000-0x0000000010029000-memory.dmp family_gh0strat behavioral2/memory/2592-16-0x0000000010000000-0x0000000010029000-memory.dmp family_gh0strat behavioral2/memory/1568-19-0x0000000010000000-0x0000000010029000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
Processes:
fvdmudpid process 8 fvdmud -
Executes dropped EXE 1 IoCs
Processes:
fvdmudpid process 8 fvdmud -
Loads dropped DLL 3 IoCs
Processes:
svchost.exesvchost.exesvchost.exepid process 4540 svchost.exe 2592 svchost.exe 1568 svchost.exe -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchost.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\wmwdvvftll svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\wukveyhryh svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\wukveyhryh svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Drops file in Program Files directory 1 IoCs
Processes:
fvdmuddescription ioc process File opened for modification C:\Program Files (x86)\%SESSIONNAME%\njvbn.xm fvdmud -
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2916 4540 WerFault.exe svchost.exe 3976 2592 WerFault.exe svchost.exe 1604 1568 WerFault.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exe74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exefvdmudsvchost.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvdmud Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exepid process 1048 74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
fvdmudsvchost.exesvchost.exesvchost.exedescription pid process Token: SeBackupPrivilege 8 fvdmud Token: SeRestorePrivilege 8 fvdmud Token: SeBackupPrivilege 8 fvdmud Token: SeRestorePrivilege 8 fvdmud Token: SeBackupPrivilege 8 fvdmud Token: SeRestorePrivilege 8 fvdmud Token: SeBackupPrivilege 8 fvdmud Token: SeRestorePrivilege 8 fvdmud Token: SeBackupPrivilege 4540 svchost.exe Token: SeRestorePrivilege 4540 svchost.exe Token: SeBackupPrivilege 4540 svchost.exe Token: SeBackupPrivilege 4540 svchost.exe Token: SeSecurityPrivilege 4540 svchost.exe Token: SeSecurityPrivilege 4540 svchost.exe Token: SeBackupPrivilege 4540 svchost.exe Token: SeBackupPrivilege 4540 svchost.exe Token: SeSecurityPrivilege 4540 svchost.exe Token: SeBackupPrivilege 4540 svchost.exe Token: SeBackupPrivilege 4540 svchost.exe Token: SeSecurityPrivilege 4540 svchost.exe Token: SeBackupPrivilege 4540 svchost.exe Token: SeRestorePrivilege 4540 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeRestorePrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeSecurityPrivilege 2592 svchost.exe Token: SeSecurityPrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeSecurityPrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeSecurityPrivilege 2592 svchost.exe Token: SeBackupPrivilege 2592 svchost.exe Token: SeRestorePrivilege 2592 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeRestorePrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeSecurityPrivilege 1568 svchost.exe Token: SeSecurityPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeSecurityPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeSecurityPrivilege 1568 svchost.exe Token: SeBackupPrivilege 1568 svchost.exe Token: SeRestorePrivilege 1568 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exedescription pid process target process PID 1048 wrote to memory of 8 1048 74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe fvdmud PID 1048 wrote to memory of 8 1048 74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe fvdmud PID 1048 wrote to memory of 8 1048 74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe fvdmud
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\users\admin\appdata\local\fvdmud"C:\Users\Admin\AppData\Local\Temp\74a0fb0e3ff8e93bf23b54818a5fda46_JaffaCakes118.exe"a -s2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10722⤵
- Program crash
PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4540 -ip 45401⤵PID:4496
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 9402⤵
- Program crash
PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2592 -ip 25921⤵PID:4888
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 10962⤵
- Program crash
PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1568 -ip 15681⤵PID:3920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD59a3b7a6563ba82a2de229c3a32899ed2
SHA1f58777a7e3e482d2e15373b2c6d50b510f739f39
SHA2567646a09ef8dd97ab57e752351174e64cd5c7f81af3d89f2d21c8a295e1e08df9
SHA51259d52af7a5791768c8e823cd397824e1917e8070a886315036ab87698adff90bf414f804857ddae73e141ab692b24ef9685fe1d1aada1984516a0831cf3c02c9
-
Filesize
204B
MD51c7474eb9a13bb56f645c36979127dfb
SHA1d646418e3173466fb60daa653f22f7910e6ef196
SHA256fa12df3f5532c6ef5ce4d8fdcc219443006137cd607850bf19bc1bbe83122bfd
SHA5129bb75179ca9ae74d297ca6c7e979627f556629775a7cd4e2fb7cc8fd49387f5af5ba784825aaa00147b23b4ef1a91723512df356f819d373b32e7f78708857fc
-
Filesize
264B
MD5c02bc12ed5bd35e431b39965cff38006
SHA1f75a9924eef67be5e89eebb1b728a53d397f8aea
SHA25678c5c0eba8be6a8f2db23e2c8f275e23592902e3b18ea0b6d81d55d6691d54e1
SHA512729d92b995aa3b701bfd95ace376d6af75d0eb795265eb053d0312c06c220c6eed214ed438fb5901df5fcf0cb00f08bbac4311accbac7258567d851e09b93d6c
-
Filesize
1.3MB
MD56947a4b3f3fc226c2f182a07dc24754b
SHA1b4cc91d43c9dadc5239dae10174a17ed0f3b1c39
SHA256bee136586a34a870e0b9e6203ba5c553f50b344b3022036bb2b3a3199ce9c2f1
SHA512392a5341c928ba590f11711610a1346d544bba9bbb43064e51aaa49a57ae06ddee106b0600116825599590fb1193f635f51e0ccfe37e2590598cfab77fc70e04