Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 22:10

General

  • Target

    880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe

  • Size

    871KB

  • MD5

    880ce9982e3158e07734f267a74ab877

  • SHA1

    73dbc461b9b8c20b8218859a050c2496be7dba5a

  • SHA256

    fdd31379f377aa417dd3bf8950bbdca7d021ef8d45b61a450d1ab2bdabd9e977

  • SHA512

    30460fd533da4ed19c5ce715f077f21b8395e90bafa52a43b4ffa02145b47aca545bf32fb944e24ecea16cd64dff5a6f617516b21f288ae10e5eaccdf2fee259

  • SSDEEP

    24576:K/uc//////ahbQkHZoFhdgTZP3Jk4CDS7ZX+:rc//////ahRHZoFATZP3Jk3SFX+

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2908
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2844
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "c:\setup.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2516
      • \??\c:\setup.exe
        c:\setup.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Users\Admin\AppData\Roaming\install18709125.exe
          C:\Users\Admin\AppData\Roaming\install18709125.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3000
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "c:\DS1.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1360
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2268
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2180
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2808
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k regsvc
    1⤵
      PID:1792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\DS1.exe

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8498a2de6d51fcbec9efe1a82c784099

      SHA1

      f68b03ccf1a6a4b870f4f5089567e6396decd1aa

      SHA256

      411e9e5137071ef401cd526e3294b5e4667ceff8e12e88ee5e0886556bb9c5b0

      SHA512

      cef3a3dd75d8e39b243eb7488460148238a2fe8adeda1185c3ffc5abae392f019a20e601f3f285f1d0e8a4b67fbbe5e03d57617d5394860db3c8b37199bc0277

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6aecec53396721394361d342cab42bf0

      SHA1

      208f295923b924c20b480fba807de9974f59f048

      SHA256

      36190bdc5ea9596a30f3b6b4c33caf74343a913979777f2990379b93153c8530

      SHA512

      13a0b1d0cfb80753a1f09b15bff47d4daee52a4e9dacdf2c9eeb29425dcf096c1020a6e72d6bbe54e30bdc0c095471b4866fbbe392d866b532775dccac147b36

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      16bb803f63cc0154c2696deb66b848c1

      SHA1

      a13a47ecdd08623f5db6eecfc135d68b9169a24b

      SHA256

      919c7a79581d1016c1832285d78c7cf43cdade34d208f06662232772ab5fc0ed

      SHA512

      aa402bf55b96e7a8667748166f8ff2ce290a899a622fdf78624fe75e95f2b6572312cd81dbc247076fff126050081c2e1d8c77a716ec316806fd533fb994c817

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      69c77d16d444debfd444e9879c7cb4df

      SHA1

      884767bb6525dddcd1b33af748be61914d4a7ed4

      SHA256

      3f61f1dd81a42fe91323a012b70abd03f4be55cca0939ee1df94bddd923a819c

      SHA512

      485dd66979b2f3a3ab4b7271fdbdf3e99ddf75604f933d563c33b89c5c041229a157d94921bac1e74476ad99b72f64b9cf9a4eb9899d49748516bfde38241fa0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a5cd395fd1e4623011595c4d13ae1093

      SHA1

      5d70be2dc63c915a720b2c2ae5285bdd2c918b08

      SHA256

      44ac271e70d5ff979aa10b26c034c08713556aa697115f88f2d3d8635a7d765a

      SHA512

      92c11a4a8059128c0403d5c377ee55aba1782af60101524947f7bc91ce5b8a949c9d2239d68421f2982934c5984eb3d9b9bc38bf23ea91314b7bd61fff6f7fba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      21438c55779555918cffcb4639198b10

      SHA1

      d911be491d5751e5073f1f517faa81202b0a9b0d

      SHA256

      3716bbf94717723298e3c024fc1b522bcb87fb6dadeaf42281604ee5f583e974

      SHA512

      2c1211c9050183211ca80c9855248b1af0c2381a0f47709b318b0bd1e0b2eeba8a61fd4b6fe092f185d5635fc25247ee243f70386502a5a8236e546ba16af0d9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8fb22450db0b23aca28a13d2949050f6

      SHA1

      318d6c14d6b30f049cc9a6a905385670a6ca4df3

      SHA256

      70273d7c23c584218be7947dd71d855feb2f640fad7458f6251dfb2503515a89

      SHA512

      3466aad2c4d6c02ec6898f16299043a5737c9bb58914081bcd4266dd0e1e15f6e8a531f75a4539c73ff7d50037fd4a4fccbff297ecadf1d52d6a44d61d69ac8a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      72ce8cf0ee581cf55c6d7db79de88fb0

      SHA1

      f84a7ca4bfc86b0449d36d4db7cbe6afa0bd77ef

      SHA256

      924e7b090f5ec0aeabbf810b385772fbf685260177b43c466b97a59a3d981b43

      SHA512

      874f46603f61b20ea0e1b93ed9c12ae596d08801194a970bccd78e3a770714102971dcacd79bf7bb5c28178e695c9ed917a4b61a4de42994bb549c9565e25be1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d9fc266147e4dfb5fa6caed86af784ef

      SHA1

      405901f08dfa4cb53dab03db9d259597e18fe0c2

      SHA256

      ddd019d2ac3075fc4ae2e1da6945d2f90797f668fa93cfb2c09e38fd0d4893e1

      SHA512

      701ff680a23f85e76618d04e92c32d4835552b30351012e7403cd0400ff9f137a4b7c3234aaf74f00a1ecd201ab938bb4d944fffbcbdc7d1216574ad29a74139

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f638fc395cdfc85b4526ad1f152abdd7

      SHA1

      1c7daa56e8598bd3cd4abcc89f7d85877c12583e

      SHA256

      19a8ca0cb2db5b5c7cd93393a30bbd284ef97c3bd2f382d482d0c37fef6b7b91

      SHA512

      5990d18a8606d8daee8a921efe9be709ef6e45250f5acf8100f95c3d7c0b0250e2a0f126c1ad9500b7576c53bfb90f17e620e23b15c8eb41599e0e5182c0ca74

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9e84005cde591e319fa159f88fdfa82d

      SHA1

      b077a5ea4241eb404381742b8b83349f849a6b60

      SHA256

      45a3cf6ffcf710fed30252c3293f029bc21c657a74e76e8c48944f2034610868

      SHA512

      a9738d75a911fbbc4be9dee1703d360ebd4205552b612a58d48ecc7d9d244babaa0cd1b13a9636d52c1cc6ff254eb630b0372b7aa84e15c34cd63c79395fff64

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      69fdba3589f8655b0b12c48034416fc2

      SHA1

      1fab1e29dabab7f06be6647869882c98d513a9de

      SHA256

      810387e9fe9af27e5a1f54c0a43e7a07f7d323a508032cc36e032712d750d154

      SHA512

      9ba45f3fcb7259b45f4b58c80509fdd5e29d6765fe94ec8a35676a81fb50a502e3337a2399397b0dd2638d8cde34609d0be53bad5633e2f3979e99c664a96cc7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      852ed15a5f3f795d0b6d0ba5839ef7b1

      SHA1

      d8d9e10313cf686c3b24510e7488a79b085e4842

      SHA256

      014eb1b47be5bb85918fa765d9d3dadf68173f98c23d3931737d5fa69e4b344d

      SHA512

      c3f97e72e5dc8d69e458d9bc4967af5de244bec57b17e941a41293674edd3b0f8395cab1f89a1335de6e455d0ee5d5da66da516d0e8b6dac7e8c7f1758870f6e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      34344638d62e664ffdb5a7e6e2421bf2

      SHA1

      25c8b9a0e8b8b313da50bb74d87e62014bdbe919

      SHA256

      5d7dd00b903f831e37cd96f7d733425d8f08c4b8f488e5a9b0550bbdc76f945c

      SHA512

      9c8ed43fa99adee00a9c1b8354b5e30511e5361e6ca7e92ce704d9381968086ddcdf2d2985bd1d9669d3a46829c926e1ed41f9606a08e42cb34efc7eb0ba8fba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      371a1414d4aa736bb65b566cd1dab45e

      SHA1

      4eef66cb88d003cf0a6490b38aa249db2827ebb6

      SHA256

      a5e8c2407364cabb6043563f13a3471ad4af98122988fe0b022730764f1882aa

      SHA512

      3a2e951135f40ac1125460af7db2e1a54ad5321eeae02b16eab9945b1128552658c4ef1126bbf7076938354cb16efb1fac840341102f907087b474373105c39f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e24722459775c88d2bd5dd6b568bfe9f

      SHA1

      6f67d0c9c353fff871315e800436d3ceacab14c0

      SHA256

      0454f988af78414fdd4cb802608fc3025979d62d095f7c79d73b884699f8f27e

      SHA512

      5f851279962c8a42f9aafed5662ec13b5d94e42fee2b9a391b2182fbff63821a58ebcf016a35eb20f2fc710af367e2ed027aed8d72242157dc58b52fa70b3a93

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      94037cbe5065627c97245191046a717f

      SHA1

      57a1fe8a3c8b84cbb23d48e3e95af4fa11147757

      SHA256

      71f35d2a48a54718a0fc8c223607d9635720ac461c351d9dda0bfb763af87a8b

      SHA512

      d9390bf04ff190ce257c7360b0a2ea7ebd3bdc9ba485838880f45f472cc10ffdbe1ed8b77c8e519093fec9fd169c45d450c4cd47b43d00afd24c355e37d010eb

    • C:\Users\Admin\AppData\Local\Temp\CabBF5C.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarC0B6.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \??\c:\setup.exe

      Filesize

      117KB

      MD5

      71b8cd2a83ab6909f6521c25ccb2af4a

      SHA1

      0c6f6a4aeed1309addc997f6ef531aab50a9721e

      SHA256

      17ca171d429cc9985a9ca79acbf612fadda3ee592935d77e8c64082ce1adabd9

      SHA512

      6b13c105b477fcf19e8153d88a52e5007aedc1cc4cdd92c3d72b2ac938240880731f466063cd9bebfc0e567aaf3acb3160b850360f1956c0c1606b8ec34b6bed

    • \??\c:\windows\SysWOW64\sneqr.cc3

      Filesize

      21.0MB

      MD5

      3449579f1fcad122e261b4e7d4eee0a5

      SHA1

      2d9cc9d30d1ee01872f66338255e648aa70c5204

      SHA256

      9415019b38b5a9a40d5cc27ffc9bb2e35954b2b71e440a4eb8b9fe2c0b075795

      SHA512

      8cfcc71ef9830afcb5730022b65b513feda51dae1be3dd5f18fe1ff477f3b4d2dd18106820420280fe90bc4e0600154a5afc7c944e36b06015a22e2d2093d4dd

    • \Users\Admin\AppData\Roaming\install18709125.exe

      Filesize

      192KB

      MD5

      8e0cb2efb3d7491cfccf88862a032d4b

      SHA1

      e8b42147091c82fd73ae12cabae4c9ddb2c2d51a

      SHA256

      7d69a9cf389a5952d0d612880d431c9cac733b22918d769e64f756ee02b0e2e7

      SHA512

      a37fa080d43600477ae83daf569bcff1ce598c5353b5157d36586686c3ca75c12e0ff78b5f176921ccd84e84a3b39a64fa733ffe20cb16fc87191eb2fceb9a51

    • memory/1984-168-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB

    • memory/2160-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2160-7-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/2160-3-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/2528-12-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2528-8-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2908-10-0x00000000001D0000-0x00000000002AF000-memory.dmp

      Filesize

      892KB