Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-08-2024 14:07

General

  • Target

    bc0af905eed914bcea2b1b7261e997a8_JaffaCakes118.exe

  • Size

    384KB

  • MD5

    bc0af905eed914bcea2b1b7261e997a8

  • SHA1

    dd56f55bc2c7446de5d2219ccd6222a8b6a850b4

  • SHA256

    8a36ff11648220c798c28391b52cfda3834716696b4030a9262d018c9e4b9e96

  • SHA512

    109513cc1d9c480df055597a5b76fc58cd9dbb3e1528658f7896a4ffef092e66d8297a8c2f22b88bd6eaa581f8173c950cbe43b5cd840d1bf7be8d4298b1d2f0

  • SSDEEP

    12288:KPdK4bgeK8VL5TKjb31wgxllhz7G60i2qvyOX:KPBjK8VlYb3P9FL

Malware Config

Signatures

  • Gh0st RAT payload 13 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc0af905eed914bcea2b1b7261e997a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc0af905eed914bcea2b1b7261e997a8_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4348
    • \??\c:\Windows\svchest425075242507520.exe
      c:\Windows\svchest425075242507520.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchest425075242507520.exe

    Filesize

    384KB

    MD5

    bc0af905eed914bcea2b1b7261e997a8

    SHA1

    dd56f55bc2c7446de5d2219ccd6222a8b6a850b4

    SHA256

    8a36ff11648220c798c28391b52cfda3834716696b4030a9262d018c9e4b9e96

    SHA512

    109513cc1d9c480df055597a5b76fc58cd9dbb3e1528658f7896a4ffef092e66d8297a8c2f22b88bd6eaa581f8173c950cbe43b5cd840d1bf7be8d4298b1d2f0

  • memory/2840-28-0x00000000006D0000-0x000000000070E000-memory.dmp

    Filesize

    248KB

  • memory/2840-19-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2840-20-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2840-23-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2840-27-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2840-21-0x00000000006D0000-0x000000000070E000-memory.dmp

    Filesize

    248KB

  • memory/2840-22-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2840-26-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2840-25-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2840-29-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/2840-24-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/4348-2-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/4348-1-0x0000000000710000-0x000000000074E000-memory.dmp

    Filesize

    248KB

  • memory/4348-10-0x0000000000401000-0x0000000000468000-memory.dmp

    Filesize

    412KB

  • memory/4348-9-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/4348-3-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/4348-6-0x0000000000750000-0x0000000000752000-memory.dmp

    Filesize

    8KB

  • memory/4348-0-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/4348-33-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/4348-5-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/4348-4-0x0000000000710000-0x000000000074E000-memory.dmp

    Filesize

    248KB

  • memory/4348-7-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/4348-8-0x00000000005E0000-0x00000000005E1000-memory.dmp

    Filesize

    4KB

  • memory/4348-31-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB

  • memory/4348-32-0x0000000000710000-0x000000000074E000-memory.dmp

    Filesize

    248KB

  • memory/4348-18-0x0000000000400000-0x000000000054E000-memory.dmp

    Filesize

    1.3MB