Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 00:19
Behavioral task
behavioral1
Sample
80c6d63bde0f3169c02ce9f831cb1973_JaffaCakes118.dll
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
80c6d63bde0f3169c02ce9f831cb1973_JaffaCakes118.dll
-
Size
95KB
-
MD5
80c6d63bde0f3169c02ce9f831cb1973
-
SHA1
d144436ebff824f2dab498ce1c263ef2511ce024
-
SHA256
c15d5e654450b75ad9a72100d3c6e8d936314979f5d1c4c4d2e52437b4f20395
-
SHA512
22822f537d09656c5e8f9bbff022eb017073ae45b0ca4028fd3acebc05a09d7249ea33f824bf44c33a65879aa4fffed8478b6e67899cd24b696b77d001db82a8
-
SSDEEP
1536:K4rJnSJx6J0mIN9JMVbr6pchWbtDIgicc4zfa4AOGTw+REb2:K4rJnSyJpbr6Cgif4Ta4AOGTw+REb2
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2280-0-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat behavioral1/memory/2280-1-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2280 2104 rundll32.exe 29 PID 2104 wrote to memory of 2280 2104 rundll32.exe 29 PID 2104 wrote to memory of 2280 2104 rundll32.exe 29 PID 2104 wrote to memory of 2280 2104 rundll32.exe 29 PID 2104 wrote to memory of 2280 2104 rundll32.exe 29 PID 2104 wrote to memory of 2280 2104 rundll32.exe 29 PID 2104 wrote to memory of 2280 2104 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\80c6d63bde0f3169c02ce9f831cb1973_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\80c6d63bde0f3169c02ce9f831cb1973_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2280
-