Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 14:49

General

  • Target

    867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    867c35c921ff72300b3567dcbe0825f1

  • SHA1

    0f9bd2936c1865a356d5968a543271753e464a50

  • SHA256

    0f19e3d235c5c6d519114c4f6a3f0d7e3509c37b95aaeb438ef7404176d12e24

  • SHA512

    28d972ba53541bd7377462e5ff70955fa4953d64b1ebdeb96b3500bfae1aa851288b8d669e73b61791874432a5b1df9f63d14b49b8a439a844ae1e6654d1d378

  • SSDEEP

    24576:LK80NYTR+caqLjbyRW1TZIDtQuMphNKylwoy8YGLvHUjlsU5XeNDq:Lv0NQ0caCvgWEQuM7QythL/0sge5q

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\867c35c921ff72300b3567dcbe0825f1_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\Ô¸Ô¸_ÍôDDOS.exe
      "C:\Users\Admin\AppData\Local\Temp\Ô¸Ô¸_ÍôDDOS.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3528
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2940
      • \??\c:\users\administrator\appdata\local\temp\insohtodl.exe
        c:\users\administrator\appdata\local\temp\insohtodl.exe ZhuDongdelC:\Users\Admin\AppData\Local\Temp\server.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3396
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3988,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3956 /prefetch:8
    1⤵
      PID:3336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\241368296_lang.dll

      Filesize

      119KB

      MD5

      03c77a82161eee4f0fdeffeacfdf2461

      SHA1

      6bfdbc2f4419a6320e80e335eb2edea028f8059f

      SHA256

      767379efc542814033da826d6d1d93e0cacd6615c991964dc5f6237c9b88224d

      SHA512

      3c624e5b96ca37672e985a622f856ff3665118febd8f49e4236d0274853b34f2d92c61ebfad2537c1a5f9df6c5ad6fd35b4cfe5755bff68dc4a067c0e9eef131

    • C:\Users\Admin\AppData\Local\Temp\nslEFDA.tmp\System.dll

      Filesize

      10KB

      MD5

      0c8ea8e6637bbf8408104e672d78ba45

      SHA1

      c231c7acaf9abb7da93f28e1b71bed164d57103e

      SHA256

      509a93177a7ae130bc3b6b5ec3236c7aa0811b8b86f8ab3442c65fdf8ff85b1f

      SHA512

      ee763a3cdbbba3b28e6a903ac942c7228bd8e54b19de21d6187e481f2916d833d9b9800e5ac2998f4aa26274cdfb20a8bfdd10f00f2a15d37bcc529b617e1f28

    • C:\Users\Admin\AppData\Local\Temp\server.exe

      Filesize

      825KB

      MD5

      8fb1d1edb38ae77f30bb42fcb883a407

      SHA1

      c757538a76a85167e4d19d2d61a92811288ba8ef

      SHA256

      e06795c9606a7ba4df1dc03209242960e28e816d2eb765c2aecc02735f790c9a

      SHA512

      051fe8047022d478a22f61dadce88f90c40b01552534755d5618cfe3cb210e804520bba526d10264dc17b095a795ee97b929070c579878a4bf819013ceabed3e

    • C:\Users\Admin\AppData\Local\Temp\Ô¸Ô¸_ÍôDDOS.exe

      Filesize

      1.2MB

      MD5

      dcf9516ee81de1797a5efba2e16b6852

      SHA1

      7397fa0b906f2557635e2bc730923422e35c699a

      SHA256

      aabc149e08477e872f3c9e6189373c3ede0591fcc465adb9859bbe441ca35744

      SHA512

      c910b7015ce20aec013137cd8ee40ab584b33f9504a18d623da9a34241ec555db8bcf7ab1c076327b47618355e5b43afd814264e138863389cd4ed4cf7d7045e

    • \??\c:\users\administrator\appdata\local\temp\insohtodl.exe

      Filesize

      825KB

      MD5

      1abdfa6708bbbcd33bac85c6903727c6

      SHA1

      ff0f185216d26a300c344846c2b2c47d146e9fa6

      SHA256

      8738a7448448a79f163b857b591818cb94b1c2586857748ad2f76bebd447f431

      SHA512

      52ca7192fa7a351bce9844366f61889aab961cc31a3479d7b6b883614dd3b383cd7d9154e8b640a282ddc720365a1d23bcdff9051adbbabf6a6274ccf05f1352

    • memory/2940-144-0x0000000000400000-0x00000000004D0000-memory.dmp

      Filesize

      832KB

    • memory/2940-128-0x0000000000400000-0x00000000004D0000-memory.dmp

      Filesize

      832KB

    • memory/3396-145-0x0000000000400000-0x00000000004D0000-memory.dmp

      Filesize

      832KB

    • memory/3528-153-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-269-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-135-0x0000000000C90000-0x0000000000C91000-memory.dmp

      Filesize

      4KB

    • memory/3528-134-0x0000000002550000-0x0000000002551000-memory.dmp

      Filesize

      4KB

    • memory/3528-133-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

      Filesize

      4KB

    • memory/3528-132-0x0000000000C40000-0x0000000000C41000-memory.dmp

      Filesize

      4KB

    • memory/3528-131-0x0000000002560000-0x0000000002561000-memory.dmp

      Filesize

      4KB

    • memory/3528-130-0x0000000000C60000-0x0000000000C61000-memory.dmp

      Filesize

      4KB

    • memory/3528-129-0x0000000000C80000-0x0000000000C81000-memory.dmp

      Filesize

      4KB

    • memory/3528-123-0x0000000000BE0000-0x0000000000C34000-memory.dmp

      Filesize

      336KB

    • memory/3528-147-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-181-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-180-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-179-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-182-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-178-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-177-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-176-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-175-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-174-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-173-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-172-0x0000000002650000-0x0000000002651000-memory.dmp

      Filesize

      4KB

    • memory/3528-171-0x0000000002660000-0x0000000002661000-memory.dmp

      Filesize

      4KB

    • memory/3528-170-0x0000000002680000-0x0000000002681000-memory.dmp

      Filesize

      4KB

    • memory/3528-151-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-168-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-167-0x00000000025B0000-0x00000000025B1000-memory.dmp

      Filesize

      4KB

    • memory/3528-166-0x0000000002620000-0x0000000002621000-memory.dmp

      Filesize

      4KB

    • memory/3528-165-0x00000000025F0000-0x00000000025F1000-memory.dmp

      Filesize

      4KB

    • memory/3528-164-0x0000000002600000-0x0000000002601000-memory.dmp

      Filesize

      4KB

    • memory/3528-163-0x0000000002590000-0x0000000002591000-memory.dmp

      Filesize

      4KB

    • memory/3528-162-0x00000000025A0000-0x00000000025A1000-memory.dmp

      Filesize

      4KB

    • memory/3528-161-0x0000000002610000-0x0000000002611000-memory.dmp

      Filesize

      4KB

    • memory/3528-160-0x00000000025C0000-0x00000000025C1000-memory.dmp

      Filesize

      4KB

    • memory/3528-159-0x00000000025E0000-0x00000000025E1000-memory.dmp

      Filesize

      4KB

    • memory/3528-158-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-157-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-156-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-155-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-154-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-115-0x0000000000400000-0x0000000000647000-memory.dmp

      Filesize

      2.3MB

    • memory/3528-152-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-169-0x00000000026A0000-0x00000000026A1000-memory.dmp

      Filesize

      4KB

    • memory/3528-136-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-225-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-148-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-146-0x0000000002570000-0x0000000002571000-memory.dmp

      Filesize

      4KB

    • memory/3528-185-0x0000000003570000-0x0000000003572000-memory.dmp

      Filesize

      8KB

    • memory/3528-187-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

      Filesize

      4KB

    • memory/3528-186-0x0000000000B60000-0x0000000000B61000-memory.dmp

      Filesize

      4KB

    • memory/3528-184-0x0000000003580000-0x0000000003581000-memory.dmp

      Filesize

      4KB

    • memory/3528-229-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-267-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-285-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-283-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-281-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-279-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-277-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-275-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-273-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-271-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-150-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-238-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-265-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-263-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-261-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-259-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-257-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-255-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-251-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-249-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-247-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-245-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-243-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-241-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-239-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-237-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-235-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-233-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-227-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-149-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/3528-253-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-223-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-222-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-231-0x00000000035F0000-0x0000000003678000-memory.dmp

      Filesize

      544KB

    • memory/3528-322-0x0000000000400000-0x0000000000647000-memory.dmp

      Filesize

      2.3MB

    • memory/3528-324-0x0000000000BE0000-0x0000000000C34000-memory.dmp

      Filesize

      336KB

    • memory/3528-325-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB