Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
867c35c921ff72300b3567dcbe0825f1
-
SHA1
0f9bd2936c1865a356d5968a543271753e464a50
-
SHA256
0f19e3d235c5c6d519114c4f6a3f0d7e3509c37b95aaeb438ef7404176d12e24
-
SHA512
28d972ba53541bd7377462e5ff70955fa4953d64b1ebdeb96b3500bfae1aa851288b8d669e73b61791874432a5b1df9f63d14b49b8a439a844ae1e6654d1d378
-
SSDEEP
24576:LK80NYTR+caqLjbyRW1TZIDtQuMphNKylwoy8YGLvHUjlsU5XeNDq:Lv0NQ0caCvgWEQuM7QythL/0sge5q
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral2/files/0x00070000000235a0-68.dat family_gh0strat behavioral2/memory/2940-144-0x0000000000400000-0x00000000004D0000-memory.dmp family_gh0strat behavioral2/files/0x00070000000235a5-143.dat family_gh0strat behavioral2/memory/3396-145-0x0000000000400000-0x00000000004D0000-memory.dmp family_gh0strat behavioral2/memory/2940-128-0x0000000000400000-0x00000000004D0000-memory.dmp family_gh0strat behavioral2/files/0x003c000000016844-316.dat family_gh0strat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{jwoaqyg9-vqb1-cl7e-ipnh-km3p5ewew2n5} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{jwoaqyg9-vqb1-cl7e-ipnh-km3p5ewew2n5}\stubpath = "c:\\users\\administrator\\appdata\\local\\temp\\insohtodl.exe" server.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 3528 Ô¸Ô¸_ÍôDDOS.exe 2940 server.exe 3396 insohtodl.exe -
Loads dropped DLL 3 IoCs
pid Process 2020 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe 3396 insohtodl.exe 3528 Ô¸Ô¸_ÍôDDOS.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\syslog.dat server.exe File opened for modification C:\Windows\SysWOW64\xcopy.exe Ô¸Ô¸_ÍôDDOS.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Gloss.ssk Ô¸Ô¸_ÍôDDOS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ô¸Ô¸_ÍôDDOS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insohtodl.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2940 server.exe 2940 server.exe 3396 insohtodl.exe 3396 insohtodl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 85899345940 2940 server.exe Token: 85899345940 3396 insohtodl.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3528 Ô¸Ô¸_ÍôDDOS.exe 3528 Ô¸Ô¸_ÍôDDOS.exe 3528 Ô¸Ô¸_ÍôDDOS.exe 3528 Ô¸Ô¸_ÍôDDOS.exe 3396 insohtodl.exe 3528 Ô¸Ô¸_ÍôDDOS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3528 2020 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe 94 PID 2020 wrote to memory of 3528 2020 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe 94 PID 2020 wrote to memory of 3528 2020 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe 94 PID 2020 wrote to memory of 2940 2020 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe 95 PID 2020 wrote to memory of 2940 2020 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe 95 PID 2020 wrote to memory of 2940 2020 867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe 95 PID 2940 wrote to memory of 3396 2940 server.exe 96 PID 2940 wrote to memory of 3396 2940 server.exe 96 PID 2940 wrote to memory of 3396 2940 server.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Ô¸Ô¸_ÍôDDOS.exe"C:\Users\Admin\AppData\Local\Temp\Ô¸Ô¸_ÍôDDOS.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\users\administrator\appdata\local\temp\insohtodl.exec:\users\administrator\appdata\local\temp\insohtodl.exe ZhuDongdelC:\Users\Admin\AppData\Local\Temp\server.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3988,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3956 /prefetch:81⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD503c77a82161eee4f0fdeffeacfdf2461
SHA16bfdbc2f4419a6320e80e335eb2edea028f8059f
SHA256767379efc542814033da826d6d1d93e0cacd6615c991964dc5f6237c9b88224d
SHA5123c624e5b96ca37672e985a622f856ff3665118febd8f49e4236d0274853b34f2d92c61ebfad2537c1a5f9df6c5ad6fd35b4cfe5755bff68dc4a067c0e9eef131
-
Filesize
10KB
MD50c8ea8e6637bbf8408104e672d78ba45
SHA1c231c7acaf9abb7da93f28e1b71bed164d57103e
SHA256509a93177a7ae130bc3b6b5ec3236c7aa0811b8b86f8ab3442c65fdf8ff85b1f
SHA512ee763a3cdbbba3b28e6a903ac942c7228bd8e54b19de21d6187e481f2916d833d9b9800e5ac2998f4aa26274cdfb20a8bfdd10f00f2a15d37bcc529b617e1f28
-
Filesize
825KB
MD58fb1d1edb38ae77f30bb42fcb883a407
SHA1c757538a76a85167e4d19d2d61a92811288ba8ef
SHA256e06795c9606a7ba4df1dc03209242960e28e816d2eb765c2aecc02735f790c9a
SHA512051fe8047022d478a22f61dadce88f90c40b01552534755d5618cfe3cb210e804520bba526d10264dc17b095a795ee97b929070c579878a4bf819013ceabed3e
-
Filesize
1.2MB
MD5dcf9516ee81de1797a5efba2e16b6852
SHA17397fa0b906f2557635e2bc730923422e35c699a
SHA256aabc149e08477e872f3c9e6189373c3ede0591fcc465adb9859bbe441ca35744
SHA512c910b7015ce20aec013137cd8ee40ab584b33f9504a18d623da9a34241ec555db8bcf7ab1c076327b47618355e5b43afd814264e138863389cd4ed4cf7d7045e
-
Filesize
825KB
MD51abdfa6708bbbcd33bac85c6903727c6
SHA1ff0f185216d26a300c344846c2b2c47d146e9fa6
SHA2568738a7448448a79f163b857b591818cb94b1c2586857748ad2f76bebd447f431
SHA51252ca7192fa7a351bce9844366f61889aab961cc31a3479d7b6b883614dd3b383cd7d9154e8b640a282ddc720365a1d23bcdff9051adbbabf6a6274ccf05f1352