Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe
-
Size
380KB
-
MD5
b71ad43b7fb81608ce1b36a5be5dec7d
-
SHA1
ec7914dada86c26417d6a91ca2068113f7970c2a
-
SHA256
518b446934ff93f157103844072294d485333c58e3d6e02af55d1feff072b49d
-
SHA512
cf056cb701adc8b97bb4b82f96d566ec0111d156431ed8ecd73398f23e490182ce384c67517874047e95e6236acac00db152e23111ef3efe0f861b6888778ace
-
SSDEEP
6144:S39J9xt91YUj6W+F8u5bRFF2idZecnl20lHRxp3gHPp3SBo03ty/4QTRGP/D1WiW:AxRefPF3Z4mxxEPj0AR+D1WF8qGqr
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2136-47-0x0000000010000000-0x000000001007F000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityex.dll" b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x000b00000001202f-4.dat aspack_v212_v242 behavioral1/files/0x00080000000166c7-51.dat aspack_v212_v242 -
Loads dropped DLL 2 IoCs
pid Process 2136 b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe 2776 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilityex.dll b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b71ad43b7fb81608ce1b36a5be5dec7d_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2136
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD590468db3d00ccdb527d84bcf37c37532
SHA1f7948fed8ac18b2f5c85e456d3aacac496db0479
SHA256c8e4f18ff8bcd6ce22695956ab7f7139727cd0736b7ae9800898ed6c7ec344d2
SHA51241ce0b1765248401407c3bda59f900b0f024ad1cff5dc69cb6a86de0bee1dcdd46556250937cbea84549c4ec2a026164e01729d7ac50b3bf389bc899bb645cdd
-
Filesize
370KB
MD5e763e2fe37c5f879c8dd01298c321e14
SHA1ecf499d4b15390911e04c4fce85120d20eab374b
SHA256a8b2d556aab03feacfd8a4582411135a30c648a9d5dd3862b1f185a0f12587ac
SHA5127b47c408ade588da768143e0fd7ba44538714d560e60a83c5a6959ba2d5b0731691cc7468244c988cf7637b50d50d44c0f6249e5efd7414dbf893963599b279a