Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe
-
Size
192KB
-
MD5
8599c21f2cd200908ac44c8f9877b56b
-
SHA1
482f99ecdbfc8ccf68abe2a3c03ac9d4a9d2c6b2
-
SHA256
4144e1a086c389b2636dbe69b39b96475ee768344d14f06ea79172de578f5740
-
SHA512
14daeee12cec4d5981df4b873e6dd106151bacb88fc50f475d1beedfa3288f00fb593b55767a3f549e56368c0552f3b00dedaa7d39ff2773441c615acfe38fe8
-
SSDEEP
3072:zW34OunPcdCxG8yywLEO2FdHuCDZifQ9ngYiMdr6K0n6Cc0B:zM4OunPcLywydHuAZifSnpr6K0nnc0
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x00080000000234bf-7.dat family_gh0strat behavioral2/memory/2912-9-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/4652-12-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/1716-15-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 4352 msuytoxjhj -
Executes dropped EXE 1 IoCs
pid Process 4352 msuytoxjhj -
Loads dropped DLL 3 IoCs
pid Process 2912 svchost.exe 4652 svchost.exe 1716 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\dqpjjiktho svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\dyecrlnquj svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\dhruaopoif svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 1960 2912 WerFault.exe 91 4460 4652 WerFault.exe 96 3652 1716 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msuytoxjhj Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 4352 msuytoxjhj Token: SeBackupPrivilege 4352 msuytoxjhj Token: SeBackupPrivilege 4352 msuytoxjhj Token: SeRestorePrivilege 4352 msuytoxjhj Token: SeBackupPrivilege 2912 svchost.exe Token: SeRestorePrivilege 2912 svchost.exe Token: SeBackupPrivilege 2912 svchost.exe Token: SeBackupPrivilege 2912 svchost.exe Token: SeSecurityPrivilege 2912 svchost.exe Token: SeSecurityPrivilege 2912 svchost.exe Token: SeBackupPrivilege 2912 svchost.exe Token: SeBackupPrivilege 2912 svchost.exe Token: SeSecurityPrivilege 2912 svchost.exe Token: SeBackupPrivilege 2912 svchost.exe Token: SeBackupPrivilege 2912 svchost.exe Token: SeSecurityPrivilege 2912 svchost.exe Token: SeBackupPrivilege 2912 svchost.exe Token: SeRestorePrivilege 2912 svchost.exe Token: SeBackupPrivilege 4652 svchost.exe Token: SeRestorePrivilege 4652 svchost.exe Token: SeBackupPrivilege 4652 svchost.exe Token: SeBackupPrivilege 4652 svchost.exe Token: SeSecurityPrivilege 4652 svchost.exe Token: SeSecurityPrivilege 4652 svchost.exe Token: SeBackupPrivilege 4652 svchost.exe Token: SeBackupPrivilege 4652 svchost.exe Token: SeSecurityPrivilege 4652 svchost.exe Token: SeBackupPrivilege 4652 svchost.exe Token: SeBackupPrivilege 4652 svchost.exe Token: SeSecurityPrivilege 4652 svchost.exe Token: SeBackupPrivilege 4652 svchost.exe Token: SeRestorePrivilege 4652 svchost.exe Token: SeBackupPrivilege 1716 svchost.exe Token: SeRestorePrivilege 1716 svchost.exe Token: SeBackupPrivilege 1716 svchost.exe Token: SeBackupPrivilege 1716 svchost.exe Token: SeSecurityPrivilege 1716 svchost.exe Token: SeSecurityPrivilege 1716 svchost.exe Token: SeBackupPrivilege 1716 svchost.exe Token: SeBackupPrivilege 1716 svchost.exe Token: SeSecurityPrivilege 1716 svchost.exe Token: SeBackupPrivilege 1716 svchost.exe Token: SeBackupPrivilege 1716 svchost.exe Token: SeSecurityPrivilege 1716 svchost.exe Token: SeBackupPrivilege 1716 svchost.exe Token: SeRestorePrivilege 1716 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4352 4836 8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe 86 PID 4836 wrote to memory of 4352 4836 8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe 86 PID 4836 wrote to memory of 4352 4836 8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
\??\c:\users\admin\appdata\local\msuytoxjhj"C:\Users\Admin\AppData\Local\Temp\8599c21f2cd200908ac44c8f9877b56b_JaffaCakes118.exe"a -sc:\users\admin\appdata\local\temp\8599c21f2cd200908ac44c8f9877b56b_jaffacakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 7922⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2912 -ip 29121⤵PID:2392
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 8762⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4652 -ip 46521⤵PID:2824
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 8762⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1716 -ip 17161⤵PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.7MB
MD59aa29a12d35b16299cafdc50ed3ff417
SHA173e44dc9708262d3c5c305658b9510c19b49d52d
SHA2565156fb65e45355a8370196c1d0a8fe90f1868c44ccc7d0ada1735bc86b71cb95
SHA5122cb81d72f95d7fa6c496165a1e4faf7ffa5d339adc7b500483a7eb64a6ffb20c0ae643b503d7456c0186205a59df9a29a4758d356c92c1392921b80b31adddd9
-
Filesize
200B
MD5c8c5d9e5e5ae114fb2bf295013d4455f
SHA16f09aeb228456c3a1dc1c4874e33368f742db4f0
SHA256844e1677b00e250837ed225151f034b7e7e69a9238ff5c27cb989ba0d6ed7045
SHA51275deaa93ef6f4ce30ecdabbde2430b517b18c2f5913f34230553bb5e747da19643b435aacbf7e6699966c02b1cbe98009c1b18248db15b375e1472e84ea248b9
-
Filesize
300B
MD5b343c66554bf9e2519b7da12277a1973
SHA185bcb5605b6d785bc91a02af160484975ceb94e3
SHA256928cbb32a13b493136831adb4a2612b27735efa7c1eea72fa4960a63febdc77f
SHA5124c5023524dc5c6c14654269d6882172b30caf19f54e8756c34b4be80226167797cfc2f54acb191eeda121918e6d9aec175208ab1a0a5fe1ea2138910fde17bc4
-
Filesize
21.1MB
MD57cb0b0b2ecf348185f82786d14cd0832
SHA19d5d1831b94691c61ead0a1ce4fd187dcc6aaab0
SHA256fdd8f22e53e43f3e5055677af7de433efa30028376fe588da4685cdb68dd1d12
SHA512e086320f929024c50f0b1c2ea17a1e8a66edf17a103dc9530ae4fabb8e1d30250ca54dead6dc3cf5eecd9f722a95f234d6a97f9fe86bcb435b570f2835c88cf2