Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2024, 22:10

General

  • Target

    880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe

  • Size

    871KB

  • MD5

    880ce9982e3158e07734f267a74ab877

  • SHA1

    73dbc461b9b8c20b8218859a050c2496be7dba5a

  • SHA256

    fdd31379f377aa417dd3bf8950bbdca7d021ef8d45b61a450d1ab2bdabd9e977

  • SHA512

    30460fd533da4ed19c5ce715f077f21b8395e90bafa52a43b4ffa02145b47aca545bf32fb944e24ecea16cd64dff5a6f617516b21f288ae10e5eaccdf2fee259

  • SSDEEP

    24576:K/uc//////ahbQkHZoFhdgTZP3Jk4CDS7ZX+:rc//////ahRHZoFATZP3Jk3SFX+

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\880ce9982e3158e07734f267a74ab877_JaffaCakes118.exe
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2908
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2844
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "c:\setup.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2516
      • \??\c:\setup.exe
        c:\setup.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Users\Admin\AppData\Roaming\install18709125.exe
          C:\Users\Admin\AppData\Roaming\install18709125.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3000
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "c:\DS1.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1360
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2268
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2180
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2808
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k regsvc
    1⤵
      PID:1792

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            8498a2de6d51fcbec9efe1a82c784099

            SHA1

            f68b03ccf1a6a4b870f4f5089567e6396decd1aa

            SHA256

            411e9e5137071ef401cd526e3294b5e4667ceff8e12e88ee5e0886556bb9c5b0

            SHA512

            cef3a3dd75d8e39b243eb7488460148238a2fe8adeda1185c3ffc5abae392f019a20e601f3f285f1d0e8a4b67fbbe5e03d57617d5394860db3c8b37199bc0277

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            6aecec53396721394361d342cab42bf0

            SHA1

            208f295923b924c20b480fba807de9974f59f048

            SHA256

            36190bdc5ea9596a30f3b6b4c33caf74343a913979777f2990379b93153c8530

            SHA512

            13a0b1d0cfb80753a1f09b15bff47d4daee52a4e9dacdf2c9eeb29425dcf096c1020a6e72d6bbe54e30bdc0c095471b4866fbbe392d866b532775dccac147b36

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            16bb803f63cc0154c2696deb66b848c1

            SHA1

            a13a47ecdd08623f5db6eecfc135d68b9169a24b

            SHA256

            919c7a79581d1016c1832285d78c7cf43cdade34d208f06662232772ab5fc0ed

            SHA512

            aa402bf55b96e7a8667748166f8ff2ce290a899a622fdf78624fe75e95f2b6572312cd81dbc247076fff126050081c2e1d8c77a716ec316806fd533fb994c817

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            69c77d16d444debfd444e9879c7cb4df

            SHA1

            884767bb6525dddcd1b33af748be61914d4a7ed4

            SHA256

            3f61f1dd81a42fe91323a012b70abd03f4be55cca0939ee1df94bddd923a819c

            SHA512

            485dd66979b2f3a3ab4b7271fdbdf3e99ddf75604f933d563c33b89c5c041229a157d94921bac1e74476ad99b72f64b9cf9a4eb9899d49748516bfde38241fa0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            a5cd395fd1e4623011595c4d13ae1093

            SHA1

            5d70be2dc63c915a720b2c2ae5285bdd2c918b08

            SHA256

            44ac271e70d5ff979aa10b26c034c08713556aa697115f88f2d3d8635a7d765a

            SHA512

            92c11a4a8059128c0403d5c377ee55aba1782af60101524947f7bc91ce5b8a949c9d2239d68421f2982934c5984eb3d9b9bc38bf23ea91314b7bd61fff6f7fba

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            21438c55779555918cffcb4639198b10

            SHA1

            d911be491d5751e5073f1f517faa81202b0a9b0d

            SHA256

            3716bbf94717723298e3c024fc1b522bcb87fb6dadeaf42281604ee5f583e974

            SHA512

            2c1211c9050183211ca80c9855248b1af0c2381a0f47709b318b0bd1e0b2eeba8a61fd4b6fe092f185d5635fc25247ee243f70386502a5a8236e546ba16af0d9

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            8fb22450db0b23aca28a13d2949050f6

            SHA1

            318d6c14d6b30f049cc9a6a905385670a6ca4df3

            SHA256

            70273d7c23c584218be7947dd71d855feb2f640fad7458f6251dfb2503515a89

            SHA512

            3466aad2c4d6c02ec6898f16299043a5737c9bb58914081bcd4266dd0e1e15f6e8a531f75a4539c73ff7d50037fd4a4fccbff297ecadf1d52d6a44d61d69ac8a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            72ce8cf0ee581cf55c6d7db79de88fb0

            SHA1

            f84a7ca4bfc86b0449d36d4db7cbe6afa0bd77ef

            SHA256

            924e7b090f5ec0aeabbf810b385772fbf685260177b43c466b97a59a3d981b43

            SHA512

            874f46603f61b20ea0e1b93ed9c12ae596d08801194a970bccd78e3a770714102971dcacd79bf7bb5c28178e695c9ed917a4b61a4de42994bb549c9565e25be1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            d9fc266147e4dfb5fa6caed86af784ef

            SHA1

            405901f08dfa4cb53dab03db9d259597e18fe0c2

            SHA256

            ddd019d2ac3075fc4ae2e1da6945d2f90797f668fa93cfb2c09e38fd0d4893e1

            SHA512

            701ff680a23f85e76618d04e92c32d4835552b30351012e7403cd0400ff9f137a4b7c3234aaf74f00a1ecd201ab938bb4d944fffbcbdc7d1216574ad29a74139

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f638fc395cdfc85b4526ad1f152abdd7

            SHA1

            1c7daa56e8598bd3cd4abcc89f7d85877c12583e

            SHA256

            19a8ca0cb2db5b5c7cd93393a30bbd284ef97c3bd2f382d482d0c37fef6b7b91

            SHA512

            5990d18a8606d8daee8a921efe9be709ef6e45250f5acf8100f95c3d7c0b0250e2a0f126c1ad9500b7576c53bfb90f17e620e23b15c8eb41599e0e5182c0ca74

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            9e84005cde591e319fa159f88fdfa82d

            SHA1

            b077a5ea4241eb404381742b8b83349f849a6b60

            SHA256

            45a3cf6ffcf710fed30252c3293f029bc21c657a74e76e8c48944f2034610868

            SHA512

            a9738d75a911fbbc4be9dee1703d360ebd4205552b612a58d48ecc7d9d244babaa0cd1b13a9636d52c1cc6ff254eb630b0372b7aa84e15c34cd63c79395fff64

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            69fdba3589f8655b0b12c48034416fc2

            SHA1

            1fab1e29dabab7f06be6647869882c98d513a9de

            SHA256

            810387e9fe9af27e5a1f54c0a43e7a07f7d323a508032cc36e032712d750d154

            SHA512

            9ba45f3fcb7259b45f4b58c80509fdd5e29d6765fe94ec8a35676a81fb50a502e3337a2399397b0dd2638d8cde34609d0be53bad5633e2f3979e99c664a96cc7

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            852ed15a5f3f795d0b6d0ba5839ef7b1

            SHA1

            d8d9e10313cf686c3b24510e7488a79b085e4842

            SHA256

            014eb1b47be5bb85918fa765d9d3dadf68173f98c23d3931737d5fa69e4b344d

            SHA512

            c3f97e72e5dc8d69e458d9bc4967af5de244bec57b17e941a41293674edd3b0f8395cab1f89a1335de6e455d0ee5d5da66da516d0e8b6dac7e8c7f1758870f6e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            34344638d62e664ffdb5a7e6e2421bf2

            SHA1

            25c8b9a0e8b8b313da50bb74d87e62014bdbe919

            SHA256

            5d7dd00b903f831e37cd96f7d733425d8f08c4b8f488e5a9b0550bbdc76f945c

            SHA512

            9c8ed43fa99adee00a9c1b8354b5e30511e5361e6ca7e92ce704d9381968086ddcdf2d2985bd1d9669d3a46829c926e1ed41f9606a08e42cb34efc7eb0ba8fba

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            371a1414d4aa736bb65b566cd1dab45e

            SHA1

            4eef66cb88d003cf0a6490b38aa249db2827ebb6

            SHA256

            a5e8c2407364cabb6043563f13a3471ad4af98122988fe0b022730764f1882aa

            SHA512

            3a2e951135f40ac1125460af7db2e1a54ad5321eeae02b16eab9945b1128552658c4ef1126bbf7076938354cb16efb1fac840341102f907087b474373105c39f

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            e24722459775c88d2bd5dd6b568bfe9f

            SHA1

            6f67d0c9c353fff871315e800436d3ceacab14c0

            SHA256

            0454f988af78414fdd4cb802608fc3025979d62d095f7c79d73b884699f8f27e

            SHA512

            5f851279962c8a42f9aafed5662ec13b5d94e42fee2b9a391b2182fbff63821a58ebcf016a35eb20f2fc710af367e2ed027aed8d72242157dc58b52fa70b3a93

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            94037cbe5065627c97245191046a717f

            SHA1

            57a1fe8a3c8b84cbb23d48e3e95af4fa11147757

            SHA256

            71f35d2a48a54718a0fc8c223607d9635720ac461c351d9dda0bfb763af87a8b

            SHA512

            d9390bf04ff190ce257c7360b0a2ea7ebd3bdc9ba485838880f45f472cc10ffdbe1ed8b77c8e519093fec9fd169c45d450c4cd47b43d00afd24c355e37d010eb

          • C:\Users\Admin\AppData\Local\Temp\CabBF5C.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\TarC0B6.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • \??\c:\setup.exe

            Filesize

            117KB

            MD5

            71b8cd2a83ab6909f6521c25ccb2af4a

            SHA1

            0c6f6a4aeed1309addc997f6ef531aab50a9721e

            SHA256

            17ca171d429cc9985a9ca79acbf612fadda3ee592935d77e8c64082ce1adabd9

            SHA512

            6b13c105b477fcf19e8153d88a52e5007aedc1cc4cdd92c3d72b2ac938240880731f466063cd9bebfc0e567aaf3acb3160b850360f1956c0c1606b8ec34b6bed

          • \??\c:\windows\SysWOW64\sneqr.cc3

            Filesize

            21.0MB

            MD5

            3449579f1fcad122e261b4e7d4eee0a5

            SHA1

            2d9cc9d30d1ee01872f66338255e648aa70c5204

            SHA256

            9415019b38b5a9a40d5cc27ffc9bb2e35954b2b71e440a4eb8b9fe2c0b075795

            SHA512

            8cfcc71ef9830afcb5730022b65b513feda51dae1be3dd5f18fe1ff477f3b4d2dd18106820420280fe90bc4e0600154a5afc7c944e36b06015a22e2d2093d4dd

          • \Users\Admin\AppData\Roaming\install18709125.exe

            Filesize

            192KB

            MD5

            8e0cb2efb3d7491cfccf88862a032d4b

            SHA1

            e8b42147091c82fd73ae12cabae4c9ddb2c2d51a

            SHA256

            7d69a9cf389a5952d0d612880d431c9cac733b22918d769e64f756ee02b0e2e7

            SHA512

            a37fa080d43600477ae83daf569bcff1ce598c5353b5157d36586686c3ca75c12e0ff78b5f176921ccd84e84a3b39a64fa733ffe20cb16fc87191eb2fceb9a51

          • memory/1984-168-0x0000000000400000-0x00000000004DF000-memory.dmp

            Filesize

            892KB

          • memory/2160-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2160-7-0x0000000000400000-0x00000000004BA000-memory.dmp

            Filesize

            744KB

          • memory/2160-3-0x0000000000400000-0x00000000004BA000-memory.dmp

            Filesize

            744KB

          • memory/2528-12-0x0000000000400000-0x00000000004BC000-memory.dmp

            Filesize

            752KB

          • memory/2528-8-0x0000000000400000-0x00000000004BC000-memory.dmp

            Filesize

            752KB

          • memory/2908-10-0x00000000001D0000-0x00000000002AF000-memory.dmp

            Filesize

            892KB