Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe
-
Size
183KB
-
MD5
851084f61e6a179ba90cee7070ef7fa7
-
SHA1
f624558617d007883f4e99b23a9ff3264a85e01c
-
SHA256
57a3ff0daf7c100908e9fd51ac4af63505c67ce68e5f584f4cb1966ed432316f
-
SHA512
6a8de9f11f37428cf8dfd2c291e3ea5d321d656080d0de0929f2f7f85a022a5fc93d6811038b30ae9991119a7cea56e83b19d4271f9a5e9a1dcd62fc98483db0
-
SSDEEP
3072:LMqKbTtCSIT0chwzzcdZKF8UvvoeWofjjpAVioRF8s//NLj6h+EvtR+:Y9MMmwzlqUHoeWofjjpAViY/lH6h+Ev+
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3536-4-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/3536-3-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/3536-6-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/3536-2-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXA47A9106 = "C:\\Windows\\XXXXXXA47A9106\\svchsot.exe" 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\XXXXXXA47A9106\svchsot.exe 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe File created C:\Windows\XXXXXXA47A9106\JH.BAT 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe File created C:\Windows\XXXXXXA47A9106\svchsot.exe 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 536 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 2908 net1.exe 4848 net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3536 wrote to memory of 3620 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 84 PID 3536 wrote to memory of 3620 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 84 PID 3536 wrote to memory of 3620 3536 851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe 84 PID 3620 wrote to memory of 2472 3620 cmd.exe 86 PID 3620 wrote to memory of 2472 3620 cmd.exe 86 PID 3620 wrote to memory of 2472 3620 cmd.exe 86 PID 3620 wrote to memory of 536 3620 cmd.exe 87 PID 3620 wrote to memory of 536 3620 cmd.exe 87 PID 3620 wrote to memory of 536 3620 cmd.exe 87 PID 3620 wrote to memory of 4848 3620 cmd.exe 88 PID 3620 wrote to memory of 4848 3620 cmd.exe 88 PID 3620 wrote to memory of 4848 3620 cmd.exe 88 PID 4848 wrote to memory of 2908 4848 net.exe 89 PID 4848 wrote to memory of 2908 4848 net.exe 89 PID 4848 wrote to memory of 2908 4848 net.exe 89 PID 3620 wrote to memory of 4108 3620 cmd.exe 91 PID 3620 wrote to memory of 4108 3620 cmd.exe 91 PID 3620 wrote to memory of 4108 3620 cmd.exe 91 PID 3620 wrote to memory of 8 3620 cmd.exe 92 PID 3620 wrote to memory of 8 3620 cmd.exe 92 PID 3620 wrote to memory of 8 3620 cmd.exe 92 PID 3620 wrote to memory of 4964 3620 cmd.exe 93 PID 3620 wrote to memory of 4964 3620 cmd.exe 93 PID 3620 wrote to memory of 4964 3620 cmd.exe 93 PID 3620 wrote to memory of 3760 3620 cmd.exe 94 PID 3620 wrote to memory of 3760 3620 cmd.exe 94 PID 3620 wrote to memory of 3760 3620 cmd.exe 94 PID 3620 wrote to memory of 4100 3620 cmd.exe 95 PID 3620 wrote to memory of 4100 3620 cmd.exe 95 PID 3620 wrote to memory of 4100 3620 cmd.exe 95 PID 3620 wrote to memory of 216 3620 cmd.exe 96 PID 3620 wrote to memory of 216 3620 cmd.exe 96 PID 3620 wrote to memory of 216 3620 cmd.exe 96 PID 3620 wrote to memory of 3368 3620 cmd.exe 97 PID 3620 wrote to memory of 3368 3620 cmd.exe 97 PID 3620 wrote to memory of 3368 3620 cmd.exe 97 PID 3620 wrote to memory of 3216 3620 cmd.exe 98 PID 3620 wrote to memory of 3216 3620 cmd.exe 98 PID 3620 wrote to memory of 3216 3620 cmd.exe 98 PID 3620 wrote to memory of 3360 3620 cmd.exe 99 PID 3620 wrote to memory of 3360 3620 cmd.exe 99 PID 3620 wrote to memory of 3360 3620 cmd.exe 99 PID 3620 wrote to memory of 1300 3620 cmd.exe 100 PID 3620 wrote to memory of 1300 3620 cmd.exe 100 PID 3620 wrote to memory of 1300 3620 cmd.exe 100 PID 3620 wrote to memory of 1152 3620 cmd.exe 101 PID 3620 wrote to memory of 1152 3620 cmd.exe 101 PID 3620 wrote to memory of 1152 3620 cmd.exe 101 PID 3620 wrote to memory of 2828 3620 cmd.exe 102 PID 3620 wrote to memory of 2828 3620 cmd.exe 102 PID 3620 wrote to memory of 2828 3620 cmd.exe 102 PID 3620 wrote to memory of 3124 3620 cmd.exe 103 PID 3620 wrote to memory of 3124 3620 cmd.exe 103 PID 3620 wrote to memory of 3124 3620 cmd.exe 103 PID 3620 wrote to memory of 920 3620 cmd.exe 105 PID 3620 wrote to memory of 920 3620 cmd.exe 105 PID 3620 wrote to memory of 920 3620 cmd.exe 105 PID 3620 wrote to memory of 2228 3620 cmd.exe 106 PID 3620 wrote to memory of 2228 3620 cmd.exe 106 PID 3620 wrote to memory of 2228 3620 cmd.exe 106 PID 3620 wrote to memory of 3768 3620 cmd.exe 107 PID 3620 wrote to memory of 3768 3620 cmd.exe 107 PID 3620 wrote to memory of 3768 3620 cmd.exe 107 PID 3620 wrote to memory of 5028 3620 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\851084f61e6a179ba90cee7070ef7fa7_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\XXXXXXA47A9106\JH.BAT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:536
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:2908
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4108
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:8
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3368
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3360
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:920
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2024
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1912
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXXA47A9106\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54de49607320559cebeb5ce34ff2e6147
SHA124068867f5261ebc641a0e5571ff41a30e9bbffe
SHA256f41e109c73a03e5bb4ec8f7c65d88255a69dba66b59f8049e58c8fd5a23331b9
SHA5124645f4b1a5698a5a891af9b7217bdbcbf51d068f5599208a1e3fe8fcd3bfa820b074c8126eb8d215eb5fd28df264d69c1c47ee3ff64f16375d06ac21c26c197c