Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 16:50
Behavioral task
behavioral1
Sample
c93a0eec7cd37d0b385dd7f30b658271_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c93a0eec7cd37d0b385dd7f30b658271_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c93a0eec7cd37d0b385dd7f30b658271_JaffaCakes118.exe
-
Size
111KB
-
MD5
c93a0eec7cd37d0b385dd7f30b658271
-
SHA1
523688ff1fcbab6da4a0244bb3c24bead0eb332e
-
SHA256
bf3432ac86937b98d6eb28d1c28025949943fe8ef1c7d89dc5d8cbf1af883265
-
SHA512
9e7ab9a0b3e5fdf9ba283b23291f78a9f2d961b156af40514037640440b82ffd8bd97750df707957c7bcd7b007f6117612ffe4dd02821d670fd2138f7dfb2555
-
SSDEEP
3072:dZ8MZsGA6P1XhkUVg8H8pd9Ti6iki1z3v:dZ8KsOtx1geCd9i6Ri1bv
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2776-0-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral1/files/0x000a000000016b9b-2.dat family_gh0strat behavioral1/memory/2776-4-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Microsoft MR\Parameters\ServiceDll = "C:\\Windows\\system32\\360SP2.dll" c93a0eec7cd37d0b385dd7f30b658271_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2028 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\360SP2.dll c93a0eec7cd37d0b385dd7f30b658271_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c93a0eec7cd37d0b385dd7f30b658271_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c93a0eec7cd37d0b385dd7f30b658271_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
PID:2776
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD51c7452c4f8377a07c8f95d03f267f8c2
SHA1a36cd451f9f4b59877eee190ecbe30f09e65e112
SHA25666a5f092e66be250275b387b88c89ee4df442ed6fd20577326cf6cd89c3fe49f
SHA5125f4225b3ae8990dd165bca8d01bf4e5cb19fba9967d5a5e5902e151f22f67f1c75dd0044dd33c1c0eef52446dff683dc3cfa0476885576389d5015a2d0756b6b