Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe
-
Size
376KB
-
MD5
8ccdf8857054fa2efc455b69258956a6
-
SHA1
58bfe73edcb7c862e73bd35c6587ef12497295a1
-
SHA256
9e30fdfa70ce4289e48461c2862f1806e79633c0416fff1832a30d665ce7c1e8
-
SHA512
09a90013195ee2e9421681b81da399797de69f7bef96144a47bdc28d015b3b6331d65b7c3438a4ac6f8145181730412f15db39d74fe050cd88adfd5475fd25f1
-
SSDEEP
6144:jfYte9zBUGBIVKH1yF2idZecnl20lHRxp3g/KzXHwxrE7eMsSgmLVFweF4X3Y:EUFBGVKVuF3Z4mxxmKjQxw73sSgmLVyw
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000a00000001202e-33.dat family_gh0strat behavioral1/files/0x0008000000016d49-35.dat family_gh0strat behavioral1/memory/2204-39-0x0000000000400000-0x0000000000470000-memory.dmp family_gh0strat -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys 8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys svchost.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityex.dll" 8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2084 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2204 8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe 2084 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilityex.dll 8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 480 Process not Found 480 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ccdf8857054fa2efc455b69258956a6_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2204
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in Drivers directory
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD511c87eb71cfc66f301fc71ea457c8ccf
SHA18a76ec66dfda3de07a55c483cf8ca899a49128fa
SHA256c543d6db3adb34bf4b6619a1d9a317ad952294174bb12bc55ad2ccd330dbf3ad
SHA512fbabb9889a13524f745c3e0e2ecf35227ed25d8dea1e9f037a48f1fa76d891ca8875a3e28ff2f2cdf38e59e858e28c6575be62c12c825e3979c7595b11647c97
-
Filesize
98KB
MD5453cdd459580ab931813287f3bb170d3
SHA128d443b1ba4c0a151c8d2516697bb6162d118607
SHA256f410f8fc989b34a8b08585014a08dfb060122f01cc4b4e6d9fbf70a68bd9aac5
SHA5127666319f6ed58261682dab008b194f2dd73c5ededbb86389fe999178b57a028b1888545b51d44d1fa5887bcfabed2c08ade519ebd7fa325767fd7cec858ee423