Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 13:28
Behavioral task
behavioral1
Sample
de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe
-
Size
139KB
-
MD5
de57e893f8c4b7b3dc4ec72c92486c64
-
SHA1
714384e3b6ecc40ee5756135423ab729696bb586
-
SHA256
7e2a9631483e676811e9c3e2e0e6d8f5dcfce9b0dc2fde416c652c658d182d96
-
SHA512
16fead502e04042eecc5d96f13dbc7a51129e7ab9ab70cb340322d54ae4b2d24cdad63c24b04fe276a6809c7081d14b8102993e512c8591d3d252300275e7f58
-
SSDEEP
3072:pfa5QzbQxuY9SPuFjpo8xZzXFR0NbUEmplfaE+zUV:pfa5QXQZEGbo8xNT0tS/yE
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2488-0-0x0000000000400000-0x0000000000424000-memory.dmp family_gh0strat behavioral1/files/0x000a000000012234-2.dat family_gh0strat behavioral1/memory/2488-9-0x0000000000400000-0x0000000000424000-memory.dmp family_gh0strat -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\$GMH\Parameters\ServiceDll = "C:\\Windows\\system32\\ServerGMH.dll" de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2488 de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe 1628 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\5L9EOJ09.txt svchost.exe File opened for modification C:\Windows\SysWOW64\ServerGMH.ini de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe File created C:\Windows\SysWOW64\ServerGMH.dll de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ServerGMH.dll de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\5L9EOJ09.txt svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-20-9c-63-3d-01 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-20-9c-63-3d-01\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F42A61C8-A496-4AF7-BCF6-D6BFB10B7EF4}\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F42A61C8-A496-4AF7-BCF6-D6BFB10B7EF4}\WpadDecisionTime = e014c4e2e005db01 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-20-9c-63-3d-01\WpadDecision = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F42A61C8-A496-4AF7-BCF6-D6BFB10B7EF4}\WpadDecision = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F42A61C8-A496-4AF7-BCF6-D6BFB10B7EF4}\WpadNetworkName = "Network 3" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-20-9c-63-3d-01\WpadDecisionTime = e014c4e2e005db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F42A61C8-A496-4AF7-BCF6-D6BFB10B7EF4} svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{F42A61C8-A496-4AF7-BCF6-D6BFB10B7EF4}\0e-20-9c-63-3d-01 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\de57e893f8c4b7b3dc4ec72c92486c64_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2488
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5ee35a56893f0cf4bd80b3a1b528fef8a
SHA1bbe7fe33da4e5384b68591fa69742985a0db1b06
SHA2562f20f9be85023a34f2bd0c10d81635322c0962fd2fe50efaf0a8531d3c2ae7aa
SHA5124d68c909b2aa2b46f66084bb300155ada1ffa35e94f7c3aef144ec5e183af18a8d7058b9ed094cf0106e6be2ce100262fdbad0b6dc9b233fbb5afe79f86f99e3