Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 18:28
Static task
static1
Behavioral task
behavioral1
Sample
10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe
-
Size
91KB
-
MD5
10121be5c5d39c501133b556ec1a3430
-
SHA1
47aacb5af5c6b5f02c7149abaf475b0042b5fa6d
-
SHA256
42eb14ce7b526d9b721db986c5455fe383e83db488698a22d451c8a6fde45db0
-
SHA512
9a871936b75dc77fcde3e0098ffe2af324bc9cc273b45d1199ed2c0b3e92476043e521379cea50fd5425c4ca6eaf97364b78b51f2b322eb4c5b7e44b088dd4a8
-
SSDEEP
1536:F60hzjzldHhKgWuYQdFYXtL6af4wGTMLRQ+jmVZvuLJM85YjNd3daTF62xqE42Na:F605zVKCiXoaf4wfy+QxuNM85mdG62x4
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2328-2-0x0000000000220000-0x000000000026C000-memory.dmp family_gh0strat behavioral1/memory/2328-4-0x0000000000220000-0x000000000026C000-memory.dmp family_gh0strat behavioral1/memory/2328-6-0x0000000000220000-0x000000000026C000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 1484 net.exe 2188 net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1484 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe 31 PID 2328 wrote to memory of 1484 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe 31 PID 2328 wrote to memory of 1484 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe 31 PID 2328 wrote to memory of 1484 2328 10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe 31 PID 1484 wrote to memory of 2188 1484 net.exe 33 PID 1484 wrote to memory of 2188 1484 net.exe 33 PID 1484 wrote to memory of 2188 1484 net.exe 33 PID 1484 wrote to memory of 2188 1484 net.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\10121be5c5d39c501133b556ec1a3430_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:2188
-
-