Analysis
-
max time kernel
100s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe
-
Size
96KB
-
MD5
cf1b9798a3d1b6925d354247a27ab0cc
-
SHA1
a8e2cc17f6ca26664612109dfef9fb6b2d2bb170
-
SHA256
b2a8985ba1dfeda1d470a3170bd0823c436db7bb7825b84ce9e05150ceb5d8a1
-
SHA512
c829b950a9d057bc55afb99eeb8978c8aea8bde06b4c12d934bfc74678133e63fa5eb049ee1997aff1f076a4131d567208d6ae8cbd5056266ec0d08efb496d44
-
SSDEEP
1536:o0FusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prK++VM4LxIf:oGS4jHS8q/3nTzePCwNUh4E9KnxIf
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000a0000000233e6-15.dat family_gh0strat behavioral2/memory/3908-17-0x0000000000400000-0x000000000044E2D4-memory.dmp family_gh0strat behavioral2/memory/3136-20-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/3176-25-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/1256-30-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 3908 fybvhgrdpl -
Executes dropped EXE 1 IoCs
pid Process 3908 fybvhgrdpl -
Loads dropped DLL 3 IoCs
pid Process 3136 svchost.exe 3176 svchost.exe 1256 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\facbwruswx svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\fiqtfuxqkt svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\fqfnnxanwo svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 4980 3136 WerFault.exe 90 652 3176 WerFault.exe 94 4436 1256 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fybvhgrdpl Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3908 fybvhgrdpl 3908 fybvhgrdpl -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 3908 fybvhgrdpl Token: SeBackupPrivilege 3908 fybvhgrdpl Token: SeBackupPrivilege 3908 fybvhgrdpl Token: SeRestorePrivilege 3908 fybvhgrdpl Token: SeBackupPrivilege 3136 svchost.exe Token: SeRestorePrivilege 3136 svchost.exe Token: SeBackupPrivilege 3136 svchost.exe Token: SeBackupPrivilege 3136 svchost.exe Token: SeSecurityPrivilege 3136 svchost.exe Token: SeSecurityPrivilege 3136 svchost.exe Token: SeBackupPrivilege 3136 svchost.exe Token: SeBackupPrivilege 3136 svchost.exe Token: SeSecurityPrivilege 3136 svchost.exe Token: SeBackupPrivilege 3136 svchost.exe Token: SeBackupPrivilege 3136 svchost.exe Token: SeSecurityPrivilege 3136 svchost.exe Token: SeBackupPrivilege 3136 svchost.exe Token: SeRestorePrivilege 3136 svchost.exe Token: SeBackupPrivilege 3176 svchost.exe Token: SeRestorePrivilege 3176 svchost.exe Token: SeBackupPrivilege 3176 svchost.exe Token: SeBackupPrivilege 3176 svchost.exe Token: SeSecurityPrivilege 3176 svchost.exe Token: SeSecurityPrivilege 3176 svchost.exe Token: SeBackupPrivilege 3176 svchost.exe Token: SeBackupPrivilege 3176 svchost.exe Token: SeSecurityPrivilege 3176 svchost.exe Token: SeBackupPrivilege 3176 svchost.exe Token: SeBackupPrivilege 3176 svchost.exe Token: SeSecurityPrivilege 3176 svchost.exe Token: SeBackupPrivilege 3176 svchost.exe Token: SeRestorePrivilege 3176 svchost.exe Token: SeBackupPrivilege 1256 svchost.exe Token: SeRestorePrivilege 1256 svchost.exe Token: SeBackupPrivilege 1256 svchost.exe Token: SeBackupPrivilege 1256 svchost.exe Token: SeSecurityPrivilege 1256 svchost.exe Token: SeSecurityPrivilege 1256 svchost.exe Token: SeBackupPrivilege 1256 svchost.exe Token: SeBackupPrivilege 1256 svchost.exe Token: SeSecurityPrivilege 1256 svchost.exe Token: SeBackupPrivilege 1256 svchost.exe Token: SeBackupPrivilege 1256 svchost.exe Token: SeSecurityPrivilege 1256 svchost.exe Token: SeBackupPrivilege 1256 svchost.exe Token: SeRestorePrivilege 1256 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3908 1808 cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe 89 PID 1808 wrote to memory of 3908 1808 cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe 89 PID 1808 wrote to memory of 3908 1808 cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\users\admin\appdata\local\fybvhgrdpl"C:\Users\Admin\AppData\Local\Temp\cf1b9798a3d1b6925d354247a27ab0cc_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\cf1b9798a3d1b6925d354247a27ab0cc_jaffacakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 7842⤵
- Program crash
PID:4980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3136 -ip 31361⤵PID:4896
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 7482⤵
- Program crash
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3176 -ip 31761⤵PID:1604
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 9282⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1256 -ip 12561⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.4MB
MD529b8bd9efd07561f123c05fc640408c5
SHA165b96f1b1beb50c9f1a431e9e1faece3be9a159b
SHA25670276bb2b1c63373d69948a7d3a39f975d37b4cd6557868f5adb00ce6f1f3a85
SHA51290bab4121db1e9873a83637aeeb0a48299eb6e2b5f370bf54942a3070fcef3e3a0896ada8c79a7a91ee333ed70252d5b26054dbcd530d13949a315d9de5504cc
-
Filesize
200B
MD51d215215559b42988dd5424637d025b6
SHA1cdae50f00f18e4f15033fcb9b1827645e8d1e634
SHA25639b16145103c15694ef2a4d066fef979915e1ab27094fb49ff210e3d71f70d2f
SHA512e867080672c1d20ea017f1bcd2dc7d84143aa3a07f675203cc48a81b3e2398538108d67cf54ed8aa70eb791d20ee4d1ed8ecbe679289428b1786fcaa5f213b3f
-
Filesize
300B
MD5637a0431b14a9de5bf2faff3d8cc0ab4
SHA1a4f013dfcfb5948e694241a399772a67102c5ee1
SHA25632000be9cc579f034cda7b88d96e3097ae1d9e4003532d24ef9bc00daa1dc43b
SHA5129a64f62d23053c05346210923adf821244759b3dabae4dbfc2db01708ce0a3b4a952e29a2eb482e9aa7db2963d94c97cde3d97a17d970123d75926555ab614cb
-
Filesize
23.1MB
MD5e79103601734866b0c0ce0a8bbd5b951
SHA11527d0af50e79a870af25758a60e29518c5f904d
SHA256453c2bb8d1ce4e0c95597cd81543c324f833a0cc10842a0bf33d12ac3294daf5
SHA512dc229a371de5eea69fd95d265da6cd42923d67f7aad511499a9d7747f4ff6db6fc8a871fc3e5ec11aac7c061b2aea509c5dadfaeefb16fc6fafebf19377d1af4