Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe
-
Size
173KB
-
MD5
8605b02ce7da287ca5db5f6235925bc6
-
SHA1
3c676c57c074e8a9aec4b0b159758fe6b1a08e02
-
SHA256
10865c6d3d893ab83787a859a740166f555c085524c2a64069f30aa633eb2d9e
-
SHA512
77576b4a5650434b70cfea51a00ded21dfbb3ce67616c974ebbbc9598971cc1d55571976e9794debd1fb87b1597ceae9253e2cc9c0f92bbcb4a37b2d919a8aff
-
SSDEEP
3072:ZhT2137DYmJoAbaZBJcFJu9Km563zXZeJeSG+bhN4HMO5Ur2v5skE:ZhRKicdqMzXZeJeS5bhN4Hdxs7
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000500000001d9ff-24.dat family_gh0strat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2944 AutumnLeaves.exe 2636 Default.exe -
Loads dropped DLL 1 IoCs
pid Process 2616 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrdcmokba svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRA~2\NETMEE~1\dodje.biz Default.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutumnLeaves.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeBackupPrivilege 2636 Default.exe Token: SeRestorePrivilege 2636 Default.exe Token: SeBackupPrivilege 2636 Default.exe Token: SeRestorePrivilege 2636 Default.exe Token: SeBackupPrivilege 2616 svchost.exe Token: SeRestorePrivilege 2616 svchost.exe Token: SeBackupPrivilege 2616 svchost.exe Token: SeBackupPrivilege 2616 svchost.exe Token: SeSecurityPrivilege 2616 svchost.exe Token: SeSecurityPrivilege 2616 svchost.exe Token: SeBackupPrivilege 2616 svchost.exe Token: SeBackupPrivilege 2616 svchost.exe Token: SeSecurityPrivilege 2616 svchost.exe Token: SeBackupPrivilege 2616 svchost.exe Token: SeBackupPrivilege 2616 svchost.exe Token: SeSecurityPrivilege 2616 svchost.exe Token: SeBackupPrivilege 2616 svchost.exe Token: SeRestorePrivilege 2616 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 AutumnLeaves.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2944 AutumnLeaves.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 968 wrote to memory of 2944 968 8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe 85 PID 968 wrote to memory of 2944 968 8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe 85 PID 968 wrote to memory of 2944 968 8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe 85 PID 968 wrote to memory of 2636 968 8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe 86 PID 968 wrote to memory of 2636 968 8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe 86 PID 968 wrote to memory of 2636 968 8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8605b02ce7da287ca5db5f6235925bc6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:968 -
C:\AutumnLeaves.exe"C:\AutumnLeaves.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2944
-
-
C:\Default.exe"C:\Default.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "netsvcs" -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD530a9d15f0984e401be72f7ee16796fed
SHA14a9bdb0ee927f4604e44174068b8138c01d3e263
SHA256d872726044e530fd2db6d254882edb9104b1b36dcebf4714ce123d88b202cdbc
SHA51274def068157e46e972104cef8fefa8b1dbe5f5e32c8fc65d7e31dc93c352e850354cbcd93e566d9f304df32e8ef47c555cf28e3f18ceab324a01ba595a490b64
-
Filesize
192KB
MD5c4c43abca605a125999a3b11f2fe495e
SHA1e67e400206ede27cca186e29a188367642a2f0d2
SHA2564743a78fc1f778414cd2a1184b61f17a154609eee2c89d81196e3eb2aa0b6999
SHA512d45146d5f8489b7bea9b58c7089bda0efb5ae4f37c752732c8cacd2b246bb498c038f9afee7e3e4291c9d007a4c0bb0f9b730685ec92d8f3e14a6908a796de6c
-
Filesize
1.1MB
MD508aee7a9b259b6b4625a83da72039090
SHA1199ffbb9191d564c1240511d349d7a221af7a2e1
SHA256858934e232e59caa492a2c1c8c2cf38d0812a41daf0eb5d6f17fd9d7fd500e55
SHA512712182746f3476ec7604b0e1732bbef23865b015aa18f2acf9a0349f023d86c7dfa87a8a298c5bf3c76610a96227fe429f567685aa5d33c66f71be05b5c3a682