Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 15:00

General

  • Target

    f644584303672c4fc86f8fd7032f5993_JaffaCakes118.exe

  • Size

    95KB

  • MD5

    f644584303672c4fc86f8fd7032f5993

  • SHA1

    681b30e41c67b2bc8a05da168e5f0881bbc977d9

  • SHA256

    9438c3b3a3414bf368ac2e43443a6923680f75cc58b6ef5639f12192c95e1a3f

  • SHA512

    19afe85b91ead8b66b480eea71d1b1d205eb088d6e98a3e8c456030b57cbbbf381fe2f0163aee2e6d98d9c7dacb9fe7917cd8337e864af399a24b2b2006380d0

  • SSDEEP

    1536:mrVmXFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prYggPPw+t+:mohS4jHS8q/3nTzePCwNUh4E9lgPPwg+

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f644584303672c4fc86f8fd7032f5993_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f644584303672c4fc86f8fd7032f5993_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2856
    • \??\c:\users\admin\appdata\local\hjvindwmli
      "C:\Users\Admin\AppData\Local\Temp\f644584303672c4fc86f8fd7032f5993_JaffaCakes118.exe" a -sc:\users\admin\appdata\local\temp\f644584303672c4fc86f8fd7032f5993_jaffacakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2924
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Storm\update\%SESSIONNAME%\hivic.cc3

    Filesize

    22.1MB

    MD5

    74cea4e276809b7edc50282dd9bf7fc9

    SHA1

    f3522bbe396a4cde7a2eb2341fcba36ab6f4b5f4

    SHA256

    5b646a10371078e4d86a0ef5231a5e1a3ef806573f01c7728b70162d29ac1803

    SHA512

    e58289920f779f49443034655e7d730a533796d0ba5147ef1c04269370dc5be705582d501c64d56c850b2dd910cd46d0bbcd810c0e967407a6aa57a1dc73e36a

  • \Users\Admin\AppData\Local\hjvindwmli

    Filesize

    24.9MB

    MD5

    9724dd458fa306c108f4c259d9aaab1f

    SHA1

    ea6f6ec6cf895ac52a0842040340ef15e03c741d

    SHA256

    b526f5ed39260da20ac7575a654299564d5dc9169f58757ca3fb79cd26d059c4

    SHA512

    993a2036684e5a398d90e2d7bd9bd9babb9dac3f269193f8a047de72c01199ca9f1bce4225f1106ead15f8c3e2079c3619a47c4d52c19c72891a570536e1c8df

  • memory/2764-29-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/2764-27-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/2764-25-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2856-14-0x0000000000400000-0x000000000044C611-memory.dmp

    Filesize

    305KB

  • memory/2856-2-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2856-13-0x0000000000310000-0x000000000035D000-memory.dmp

    Filesize

    308KB

  • memory/2856-7-0x0000000000310000-0x000000000035D000-memory.dmp

    Filesize

    308KB

  • memory/2856-1-0x0000000000400000-0x000000000044C611-memory.dmp

    Filesize

    305KB

  • memory/2924-17-0x0000000000400000-0x000000000044C611-memory.dmp

    Filesize

    305KB

  • memory/2924-24-0x0000000000400000-0x000000000044C611-memory.dmp

    Filesize

    305KB

  • memory/2924-18-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB