Analysis
-
max time kernel
150s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 09:49
Static task
static1
Behavioral task
behavioral1
Sample
b72db4545857152305c999fb36a114b3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b72db4545857152305c999fb36a114b3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b72db4545857152305c999fb36a114b3_JaffaCakes118.exe
-
Size
12.2MB
-
MD5
b72db4545857152305c999fb36a114b3
-
SHA1
73994a7f24f160fe6bcbe1196216153a7a6eb40b
-
SHA256
14f873bb4aa84aeec9a7d4d351a0ef5a28ada9885dfea43db7d20504a8d052c5
-
SHA512
4f27750b30a26f32501cd20e80c17c235479644c1767d7db15b050830486ff8dc0c7778a77c1831b11371a0b8628b9212489bc72216a6f13f31fcf65aebc1662
-
SSDEEP
3072:ZUYsFlYXTGHsRW5WNqN90WFAfjg+vFCzTP8yTQfV4CfRD1UCPmvMF:ZnsFlYXTGHswlnF+fj3FCzT0yTKLLPmE
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a00000001da30-1.dat family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\A4IgeIJc\Parameters\ServiceDll = "C:\\Windows\\system32\\OkjhhV.pic" b72db4545857152305c999fb36a114b3_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 3452 svchost.exe 1104 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\OkjhhV.pic b72db4545857152305c999fb36a114b3_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Win.ini b72db4545857152305c999fb36a114b3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b72db4545857152305c999fb36a114b3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 1104 rundll32.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 1104 rundll32.exe 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe 1104 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe Token: SeRestorePrivilege 4236 b72db4545857152305c999fb36a114b3_JaffaCakes118.exe Token: SeDebugPrivilege 3452 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1104 3452 svchost.exe 89 PID 3452 wrote to memory of 1104 3452 svchost.exe 89 PID 3452 wrote to memory of 1104 3452 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b72db4545857152305c999fb36a114b3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b72db4545857152305c999fb36a114b3_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\okjhhv.pic,CodeMain A4IgeIJc2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.1MB
MD517122371a6e04ce2184389988e8b7475
SHA1a10264e3cd3b380f7af229f25e247524fa89d5d0
SHA2564834d0a83ecdebd4bc0cbd90f9ea7d608e671cddcc3f842361f3a09ab5bea2a8
SHA5125fac8e1bc08d904c4c2384942038fd24070756589789c2e033d2c13c3602b3b7ea4780f9c7bdec3b8f4f1566624858a811d17d6520e38a67e5cfd3b9fefb020d