Analysis
-
max time kernel
140s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe
-
Size
130KB
-
MD5
c980a5632fdf0ce9dacd2285c1f73fef
-
SHA1
b6a76d0246bc2217a9f35bbe8f147d99c54fbecf
-
SHA256
0958311cdbc72029fff008692d4d344bcbfa6df469f3181309b93cd1429ce8d6
-
SHA512
8ccf64420f6f63528caef9a5554b20aa6c15cda7e5f18eea9814c0b8966af504f6d272f0d44c5416f718013e3953e1b417a90447ac7bd58de6e7e94f5a1e3e13
-
SSDEEP
3072:IsY8JPMTtmi0vZemB0taM5Gmjck0huCP3F:PGc9smesY4kjC/F
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1996-5-0x0000000010000000-0x0000000010037000-memory.dmp family_gh0strat behavioral1/memory/1996-3-0x0000000010000000-0x0000000010037000-memory.dmp family_gh0strat behavioral1/memory/1996-7-0x0000000010000000-0x0000000010037000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXEB5143C5 = "C:\\Windows\\XXXXXXEB5143C5\\svchsot.exe" c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\XXXXXXEB5143C5\JH.BAT c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2680 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 2744 net.exe 2748 net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2208 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2208 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2208 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2208 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2208 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2208 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2208 1996 c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe 29 PID 2208 wrote to memory of 3064 2208 cmd.exe 31 PID 2208 wrote to memory of 3064 2208 cmd.exe 31 PID 2208 wrote to memory of 3064 2208 cmd.exe 31 PID 2208 wrote to memory of 3064 2208 cmd.exe 31 PID 2208 wrote to memory of 3064 2208 cmd.exe 31 PID 2208 wrote to memory of 3064 2208 cmd.exe 31 PID 2208 wrote to memory of 3064 2208 cmd.exe 31 PID 2208 wrote to memory of 2680 2208 cmd.exe 32 PID 2208 wrote to memory of 2680 2208 cmd.exe 32 PID 2208 wrote to memory of 2680 2208 cmd.exe 32 PID 2208 wrote to memory of 2680 2208 cmd.exe 32 PID 2208 wrote to memory of 2680 2208 cmd.exe 32 PID 2208 wrote to memory of 2680 2208 cmd.exe 32 PID 2208 wrote to memory of 2680 2208 cmd.exe 32 PID 2208 wrote to memory of 2744 2208 cmd.exe 33 PID 2208 wrote to memory of 2744 2208 cmd.exe 33 PID 2208 wrote to memory of 2744 2208 cmd.exe 33 PID 2208 wrote to memory of 2744 2208 cmd.exe 33 PID 2208 wrote to memory of 2744 2208 cmd.exe 33 PID 2208 wrote to memory of 2744 2208 cmd.exe 33 PID 2208 wrote to memory of 2744 2208 cmd.exe 33 PID 2744 wrote to memory of 2748 2744 net.exe 34 PID 2744 wrote to memory of 2748 2744 net.exe 34 PID 2744 wrote to memory of 2748 2744 net.exe 34 PID 2744 wrote to memory of 2748 2744 net.exe 34 PID 2744 wrote to memory of 2748 2744 net.exe 34 PID 2744 wrote to memory of 2748 2744 net.exe 34 PID 2744 wrote to memory of 2748 2744 net.exe 34 PID 2208 wrote to memory of 2756 2208 cmd.exe 35 PID 2208 wrote to memory of 2756 2208 cmd.exe 35 PID 2208 wrote to memory of 2756 2208 cmd.exe 35 PID 2208 wrote to memory of 2756 2208 cmd.exe 35 PID 2208 wrote to memory of 2756 2208 cmd.exe 35 PID 2208 wrote to memory of 2756 2208 cmd.exe 35 PID 2208 wrote to memory of 2756 2208 cmd.exe 35 PID 2208 wrote to memory of 2732 2208 cmd.exe 36 PID 2208 wrote to memory of 2732 2208 cmd.exe 36 PID 2208 wrote to memory of 2732 2208 cmd.exe 36 PID 2208 wrote to memory of 2732 2208 cmd.exe 36 PID 2208 wrote to memory of 2732 2208 cmd.exe 36 PID 2208 wrote to memory of 2732 2208 cmd.exe 36 PID 2208 wrote to memory of 2732 2208 cmd.exe 36 PID 2208 wrote to memory of 2664 2208 cmd.exe 37 PID 2208 wrote to memory of 2664 2208 cmd.exe 37 PID 2208 wrote to memory of 2664 2208 cmd.exe 37 PID 2208 wrote to memory of 2664 2208 cmd.exe 37 PID 2208 wrote to memory of 2664 2208 cmd.exe 37 PID 2208 wrote to memory of 2664 2208 cmd.exe 37 PID 2208 wrote to memory of 2664 2208 cmd.exe 37 PID 2208 wrote to memory of 2692 2208 cmd.exe 38 PID 2208 wrote to memory of 2692 2208 cmd.exe 38 PID 2208 wrote to memory of 2692 2208 cmd.exe 38 PID 2208 wrote to memory of 2692 2208 cmd.exe 38 PID 2208 wrote to memory of 2692 2208 cmd.exe 38 PID 2208 wrote to memory of 2692 2208 cmd.exe 38 PID 2208 wrote to memory of 2692 2208 cmd.exe 38 PID 2208 wrote to memory of 2568 2208 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c980a5632fdf0ce9dacd2285c1f73fef_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\XXXXXXEB5143C5\JH.BAT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXXEB5143C5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c54d8baadee680bc3812d710c4412e76
SHA139549bd634d0b15759cf093f059d92a5178b7d51
SHA25636a87ed67841e950e60efc232d32312bddfefa869ed23033bb0dd5bf92cd49bb
SHA5125bf3e87cac21d804fa3a9db2c3ba4a309ac0d9a4a8c404ec607e81823c564d4301cd9e5460eab39f6ce3aaa2827e80e7afa081b267a67d99b59a219a90ed4859