Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 18:15

General

  • Target

    b98668b0d88e8801c177f2fdecdba603_JaffaCakes118.exe

  • Size

    871KB

  • MD5

    b98668b0d88e8801c177f2fdecdba603

  • SHA1

    612a4fefc2b05b75b9bb933433be02fa04b9ebed

  • SHA256

    ab83767dc9e2c6f2568eec28413a11659b7fd516e3de1cfabc90858e317bc4d9

  • SHA512

    6b3e3df876aa7c595d7cbb83741615b3ab38ab07b746280087483a4af880af381d56f14a0977aceb1fe4c60fe047e722fc6aecad98ad333d4e520041331d6111

  • SSDEEP

    24576:K/uc//////ahbQkHZoFhdgTZP3Jk4CDS7ZXw:rc//////ahRHZoFATZP3Jk3SFXw

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b98668b0d88e8801c177f2fdecdba603_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b98668b0d88e8801c177f2fdecdba603_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\b98668b0d88e8801c177f2fdecdba603_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\b98668b0d88e8801c177f2fdecdba603_JaffaCakes118.exe
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\b98668b0d88e8801c177f2fdecdba603_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\b98668b0d88e8801c177f2fdecdba603_JaffaCakes118.exe
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\program files\internet explorer\IEXPLORE.EXE
          "C:\program files\internet explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1684
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2872
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "c:\setup.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2376
      • \??\c:\setup.exe
        c:\setup.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Users\Admin\AppData\Roaming\install18709125.exe
          C:\Users\Admin\AppData\Roaming\install18709125.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2840
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "c:\DS1.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2944
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2700
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2252
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1932
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k regsvc
    1⤵
      PID:1928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      41b3eb4d5cbcf28db61674f6810565fb

      SHA1

      668ff253087fe8a4fb197f43a29944a24bc0eff9

      SHA256

      81146fa343b741feed7a72634375529cf991649813519e32dbc507645d79f572

      SHA512

      7c8c598f51c528abf9f6259235a4dfd793346bdb9e02d0818e5b1d18b59463965b788d38f0ef4d215ed9fbc1ab3771e621ca7962faf468d87e1f7c589ebabf86

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      95bc6dfb7a45553681b7bab072155192

      SHA1

      e7af662d8042dacf13baace7a59570bd5b7fd9a5

      SHA256

      1bca74e66a987672c62a49e8f79a3376e6488bdccc7c22b625dd5ca4d7f29d77

      SHA512

      29ddcd52f0a3afd2c9e092a747910c4802c8d21eab8246c72ce2378b61b72efb114f75480395c3bef679a3e3aa3c6f5dc3297db12b23d4f854b4d964d9dd58c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dfec530d5f230a2edfd65b459f32eb39

      SHA1

      bf02b7361195b020dd3dfc16bdb9f9e2e1cd1b0b

      SHA256

      15911a3867bcfbd8934e5bc0b38b73225d85b4124929ee0b60006e706f55138e

      SHA512

      2ebbe459150abbbbe83b6d23504ff890fa29228601bd3123af61fa296ce38538d8806b1cc6ff0291366b959efc0b9b0df6d227bc0c21c4545988fc9d22e2631e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4b9f4c4db5809c13ea0833023813e4cf

      SHA1

      9a34ba8de1119b9d181bd676cdcc5f25a9d4414a

      SHA256

      7ff04021aec78c876c395e74beacf4458f52ed38e9d7553b62fd054d496ee0f6

      SHA512

      b6c15f7ed38cff326f0bd6fd249db0c65764a68f38b332eadbbba2f7b34f08cd4b39d2497d4495c1c0649b06fd91a4f2eff0a92ed2d552a54280aa4a0255b2e5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f8fb51b0c1743cafd90c5f3a39a599b2

      SHA1

      c8f896aa80f0411596aabb316550a9aa4dea4363

      SHA256

      445b060608534432036b33a00e9add82915608ae753599aa3477955ed905e6c3

      SHA512

      e44437a61f0d22c62d99a62c6ee0c0fd7cd1d931a52f12c5167c12a8ff8561042b45b74df97647b57073ea2c87d6aff5cfbde3ee683926ee1ccdcfd93a5327d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6db6e938dcd91fb3a14f705250bc5c96

      SHA1

      74807599f71d4c4b0c38eae738bd197f3ee8f4e1

      SHA256

      bd7bebdaf22766e382756663b682f336a7977701ca229c11743e251be52297a4

      SHA512

      d10964c64440428bbe65b55e3007dc820b9f600375752f1820af8e6cb44ae4f70b53c132bb9a6d9bb37c01a8f790f9b693b57c2094b640152871b4ca80335b60

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9f821f2bd1b7de70cc11ef8b0ee34c00

      SHA1

      79876a934f633b88b84b47684eb7d3444418604e

      SHA256

      069cd0893068c4e90b2f7a5b9e0036ceeffb10a26ad578e0a03d89e022b3ef8f

      SHA512

      6966117f3c35882a552fa14767ad526e14c49bc9f9c688df69067cdee20ac163bdea483ba1402b8ad4f680a16d3c602fc22c84a3f3009f721294d0bb61413964

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ec9a2e6cc4df85a8656b44351b0b58de

      SHA1

      56ceb6cbcfec38c4bd78dcc7a009fd2b4f147712

      SHA256

      cc2830ab9db1e968f4ac712ef670485910226864408f5732018f7792c56c724e

      SHA512

      d6556a1e546cd1e1367352f3e4263f443960b65c309403a7520396f28de5af7bcfcab3d742e784e33d86762646dceee2ad6cc26bae3e3f9629a8b31aa793f9bd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3619afd9d1a49f571a936b100f1bee0e

      SHA1

      7b841465aca7345ffcd364c8d3de17cba95076b5

      SHA256

      9e5002bd177c5744ea59bf7af190dd52aa18db865d099401181c94a62e80d79f

      SHA512

      b7a82792040319197dfa17ab9a227a80f7faffa418d24c7ecbdf8384080a10352b96be95e082e83c5b964f560d5f9c063b1ed9a2a4effe939f0a10a203a38090

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3d269f64ed98d27ae93cf2109b46243d

      SHA1

      84f5796a5f91179447c9b55e3e69b8e45e911918

      SHA256

      a30bc785bc67edd17bf97b55c0416d758fbb83509ed7ba660c07759df339aefc

      SHA512

      136739ee09a68f1ce06877a8f1e1d0690aa7b16ebd8599dfa1db5dabd657ad2ecec34e074af44ff057c7b62194d62c8898f711aa5348f5b61e9617c708c0ec6c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c42480f8ab2e42c4c8ed49094dc1e33

      SHA1

      7308efd0b57c13c10fad58f1e60b9cdc71c407d9

      SHA256

      5edff3de9a5376ce974cb6c4018f5d2aa552d54b469b04236ea4cad7ff796d75

      SHA512

      c8e264d761862be393d89f2e6202a3afc84f4571eb237b00861d5bf193f960964351f78fac05baa07d971d65deb2b50fadf9ce0ada977d31522787df0a0d31e9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ceceb4aa25a6b6fed019c4c68288f560

      SHA1

      7bfdf8233e52e7b069c6d5afe1eece7dccb8f015

      SHA256

      b593a8a7f310d972308b6662812496c05dc2da061f6d091f9a90c3f262b4ca0a

      SHA512

      8193abd95a8f8860c7328268d931b1ec69e906e8fbe2d2d7457ae7bcb38382bfba77f482385fbad31217d685f3c17433e7357751dad2a17fffc2de40a5036447

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1672dafdcedf175a8f80f414b0275061

      SHA1

      256b4b0074316e621076522ed7e90d0c73e4fcf0

      SHA256

      a108389a171ac19042ea459915861e333a1da1ad440fff97a09764e760d83706

      SHA512

      c3ca3799d0be0320f3c296b7d479b6c8984d59fd4d7cca0d2ae2f360942b1a820699bd0b642f843c77ccfe0872df3b204df56b560bdb66b6302e7e916b08fb8b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      710c63ec00073185bb0e20601337d43d

      SHA1

      c394243a2805aaf0d570cef726a249acb4a6d73d

      SHA256

      078828019272b66f4863dd1356e1dbd499eb15a873fb1f71bb6f10be9077b9d2

      SHA512

      ff563b3295ea03e79efed1943a01a241c65b910629c702d2ebd39b65660074eb57ca8ea25c7f10aaaf312919be574e77c281729befe3e9a1c6beaf68a1eef038

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bfb6440a6c72e188fd1b1e1780e517eb

      SHA1

      4a131022092a23c2f71abc2f3505f29c781de933

      SHA256

      5e326fbeeb1f160f769675f38da300c5ba554081280c4c83ffd99266db873463

      SHA512

      557e1759e4ad8aa0be05b49c4cc3312afcee61d8ea834cd5e059749e3df516043207bfe1aebbebb876e3feebf0e41e8eec1502d5ac8862985c463ba75f255d28

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      365cfe6b8a534eed5aeedd4bf5190237

      SHA1

      6192cf73cf7aafb3ce8a23c19a57d02c957bfb28

      SHA256

      15af7f1a7ecbc1ae45f92d216d5b693fd3af75e06ba61c35a60af0ec79dd0bfd

      SHA512

      ffab5986b9702e9ab96a9f81c335a4545b7838aeaa07ec3b6f8f22e39b76ed64ade98f75a87907c0363f1dbe1f9599c84c8323d12d4c042de642d63f1b37404e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      298f2e571a56cc1f274ddecda067433e

      SHA1

      4ca1b1499033f9cbf9e25582f09b9b8a648e93c6

      SHA256

      433c7216ddce01f13874ccf0855a3c68595ef50ef3e1131cae909a1923fa2343

      SHA512

      5c9d3e0d9f5bdcd73f4e9c6a890b24cef0bedf05efc7fd38f15b8ac2962e45bda28d3284e186c1e9c5292420285049e9edecbd1bcba485960191a89bc3397531

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      083cb70beaf9203cd82defce6c77fe9c

      SHA1

      f6db395097596202813038f8deb87ec4325ccdb7

      SHA256

      134b05f2bccad0547ec0452ab81e697766238aceebae3dcb5dcb8dd91a6500af

      SHA512

      7e7edf356f09e1ec1550208cf7a31f4a27a97839e9e9be0929224e3680fb5f268bdb657c9370404a58038b6d1981e24eb20cd2a2c710e349013b4a3ece6233b6

    • C:\Users\Admin\AppData\Local\Temp\CabCBE9.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarCCA8.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \??\c:\setup.exe

      Filesize

      117KB

      MD5

      71b8cd2a83ab6909f6521c25ccb2af4a

      SHA1

      0c6f6a4aeed1309addc997f6ef531aab50a9721e

      SHA256

      17ca171d429cc9985a9ca79acbf612fadda3ee592935d77e8c64082ce1adabd9

      SHA512

      6b13c105b477fcf19e8153d88a52e5007aedc1cc4cdd92c3d72b2ac938240880731f466063cd9bebfc0e567aaf3acb3160b850360f1956c0c1606b8ec34b6bed

    • \??\c:\windows\SysWOW64\dlndu.cc3

      Filesize

      20.1MB

      MD5

      8735e9f0e6970536a27f77c920fcbeee

      SHA1

      2ab56cebb8a89082d00700a143289ab9c4d5723e

      SHA256

      92f37fe1060b148b0b71e32ee6359d77e4b804239dd008f4992bd599fa5ea77d

      SHA512

      38c18d5eed072a99b8cf9f078e1c3220337bdb829335f846ed28fb862b3ec429f95a981c3376170781cfc1efbc5a339156ab0c1ac165e3f5b369c1c3722dd5e0

    • \Users\Admin\AppData\Roaming\install18709125.exe

      Filesize

      192KB

      MD5

      8e0cb2efb3d7491cfccf88862a032d4b

      SHA1

      e8b42147091c82fd73ae12cabae4c9ddb2c2d51a

      SHA256

      7d69a9cf389a5952d0d612880d431c9cac733b22918d769e64f756ee02b0e2e7

      SHA512

      a37fa080d43600477ae83daf569bcff1ce598c5353b5157d36586686c3ca75c12e0ff78b5f176921ccd84e84a3b39a64fa733ffe20cb16fc87191eb2fceb9a51

    • memory/1684-10-0x0000000000070000-0x000000000014F000-memory.dmp

      Filesize

      892KB

    • memory/2312-8-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2312-12-0x0000000000400000-0x00000000004BC000-memory.dmp

      Filesize

      752KB

    • memory/2500-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2500-3-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/2500-7-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/3036-349-0x0000000000400000-0x00000000004DF000-memory.dmp

      Filesize

      892KB