Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 11:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
131868b892b54db71e424b1d7caf17d6_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
131868b892b54db71e424b1d7caf17d6_JaffaCakes118.dll
-
Size
56KB
-
MD5
131868b892b54db71e424b1d7caf17d6
-
SHA1
7b59eddfc4972ba0b1dea3c04309c13814f1158a
-
SHA256
8bca5fedd80c8e2aa117cbae4269ddef40293056ce17c5664184bbf110228795
-
SHA512
8bcf95f7596981bbea52f296a57fee0662038b8bf6de86e8d659758cb6582abe3fb01b2a95e44eac8446eca567a21d03bf588387ee14a75542c2412b14d47db3
-
SSDEEP
1536:DfjB6E3gt4RNGWipxKEOHyVpWh9kyJXF2KOiUba:DfjwcfNQOUZGFpOvba
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/3040-1-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat behavioral1/memory/3040-0-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3040 2648 rundll32.exe 30 PID 2648 wrote to memory of 3040 2648 rundll32.exe 30 PID 2648 wrote to memory of 3040 2648 rundll32.exe 30 PID 2648 wrote to memory of 3040 2648 rundll32.exe 30 PID 2648 wrote to memory of 3040 2648 rundll32.exe 30 PID 2648 wrote to memory of 3040 2648 rundll32.exe 30 PID 2648 wrote to memory of 3040 2648 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\131868b892b54db71e424b1d7caf17d6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\131868b892b54db71e424b1d7caf17d6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3040
-