Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:46

General

  • Target

    eae0f060e9cdbbfcc339be22f8f2dfcc_JaffaCakes118.exe

  • Size

    407KB

  • MD5

    eae0f060e9cdbbfcc339be22f8f2dfcc

  • SHA1

    a06562b70bd216c0a4b0127e1aa3b4c81f12d3e8

  • SHA256

    fcc1ceb396524d78f9f38d32491cefbef7115dbf75d33fe9e517f1efa8677231

  • SHA512

    257bd1bfe2e996cfc38724dab6bcca192497901604105cc6716cfb612d5856c652a082164158f9e515e77e3be5861797e970075b040b85af9ba4595370ea70a1

  • SSDEEP

    6144:qBk/uxfMb0kAKtF2idZecnl20lHRxp3geN+x704wANEHMywbC3FiAHQz:ok/uVIRXF3Z4mxxr+x79w7HLj3FiM6

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Drops file in Drivers directory 2 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eae0f060e9cdbbfcc339be22f8f2dfcc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eae0f060e9cdbbfcc339be22f8f2dfcc_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      2⤵
      • Drops file in Drivers directory
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:3140
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

    Filesize

    123KB

    MD5

    5d8e2b0dd876c51d33ef7dbfa5f32c76

    SHA1

    d805f6b5f89dcc51c01a716c4dab1903487f42a8

    SHA256

    04c4bd5acfbfa701dc907160372cab54ef638e0067590d7e9d959d1ec5780cdc

    SHA512

    b41d6e923d3b1e1f68a03badb7cff2a8f70b07708f1dd18bbcdb6dd0d3192584238829c80373ebcda3c103f659955808c34af7b1ac6a0f73f017df2fc0b5f34b

  • C:\Users\Admin\AppData\Local\Temp\dll.tmp

    Filesize

    88KB

    MD5

    c7587bdf96418cc1aae3d7873b25430d

    SHA1

    ed01eceac2df45889c60a11fcd7460ca6450addf

    SHA256

    78e4cd5523e6981e84148ab862ccb444be1293bbd7e9ec1df68297c077c2b79a

    SHA512

    fec44cd2382daddf662ec707cf2ec44aec7f4c89fa744fb68b31095ffa2a6ae52b04ec1de30da572cdb6694b47e321bf2dff5e25c4f0d804805a3b78cc206aa9

  • C:\Windows\SysWOW64\install.tmp

    Filesize

    55B

    MD5

    7d9f1a6ad1c9dea7b8c1edc871d153bb

    SHA1

    1e3a0ebcb7dea1e1390d6ad20c5e104c2c3959d6

    SHA256

    1b67b7351ffefa2bbdce718d456bce31f2597d89e50ed675c91f488bd2983292

    SHA512

    9ffb3c56785a6af250588f055ab4ca8ccc5fcc98c4045a7826728d1c96de30e567865c577c97d41deeccf04d108f63c04336488840e470167334b2e760e28f2b

  • memory/1680-0-0x0000000001000000-0x000000000108A000-memory.dmp

    Filesize

    552KB

  • memory/1680-1-0x0000000000720000-0x0000000000774000-memory.dmp

    Filesize

    336KB

  • memory/1680-9-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-8-0x0000000000B10000-0x0000000000B11000-memory.dmp

    Filesize

    4KB

  • memory/1680-7-0x0000000000B20000-0x0000000000B21000-memory.dmp

    Filesize

    4KB

  • memory/1680-6-0x0000000000570000-0x0000000000571000-memory.dmp

    Filesize

    4KB

  • memory/1680-5-0x00000000006C0000-0x00000000006C1000-memory.dmp

    Filesize

    4KB

  • memory/1680-4-0x0000000000B30000-0x0000000000B31000-memory.dmp

    Filesize

    4KB

  • memory/1680-3-0x00000000006E0000-0x00000000006E1000-memory.dmp

    Filesize

    4KB

  • memory/1680-2-0x0000000000710000-0x0000000000711000-memory.dmp

    Filesize

    4KB

  • memory/1680-10-0x0000000000B40000-0x0000000000B41000-memory.dmp

    Filesize

    4KB

  • memory/1680-19-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-18-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-17-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-16-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-15-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-14-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-21-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

    Filesize

    4KB

  • memory/1680-20-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1680-13-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-12-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-11-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-26-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

    Filesize

    4KB

  • memory/1680-47-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1680-46-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1680-45-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1680-44-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1680-43-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1680-42-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1680-41-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-40-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-39-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-38-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-37-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-36-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/1680-35-0x0000000000D80000-0x0000000000D81000-memory.dmp

    Filesize

    4KB

  • memory/1680-34-0x0000000000D20000-0x0000000000D21000-memory.dmp

    Filesize

    4KB

  • memory/1680-33-0x0000000000D30000-0x0000000000D31000-memory.dmp

    Filesize

    4KB

  • memory/1680-32-0x0000000000D50000-0x0000000000D51000-memory.dmp

    Filesize

    4KB

  • memory/1680-31-0x0000000000D70000-0x0000000000D71000-memory.dmp

    Filesize

    4KB

  • memory/1680-30-0x00000000030F0000-0x00000000030F1000-memory.dmp

    Filesize

    4KB

  • memory/1680-29-0x0000000000B80000-0x0000000000B81000-memory.dmp

    Filesize

    4KB

  • memory/1680-28-0x0000000000D00000-0x0000000000D01000-memory.dmp

    Filesize

    4KB

  • memory/1680-27-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

    Filesize

    4KB

  • memory/1680-23-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

    Filesize

    4KB

  • memory/1680-25-0x0000000000B60000-0x0000000000B61000-memory.dmp

    Filesize

    4KB

  • memory/1680-24-0x0000000000B70000-0x0000000000B71000-memory.dmp

    Filesize

    4KB

  • memory/1680-22-0x0000000000B90000-0x0000000000B91000-memory.dmp

    Filesize

    4KB

  • memory/1680-68-0x0000000001000000-0x000000000108A000-memory.dmp

    Filesize

    552KB

  • memory/1680-69-0x0000000000720000-0x0000000000774000-memory.dmp

    Filesize

    336KB