General
-
Target
JaffaCakes118_3b9d1a2900223810cc0168c0ebec303c
-
Size
224KB
-
Sample
250127-d39gmazkgm
-
MD5
3b9d1a2900223810cc0168c0ebec303c
-
SHA1
f2856930c0590a6fddc76b1eb520473bb31c34e3
-
SHA256
7854d2a4eee142a4382472dfe90a063eb41ff1957e3186dedc146b070831e06f
-
SHA512
7fcb2b40b0b4d19aa8750cc2bea364d63828960052ee9f16517f9dba399c502571ca09d8215f43f4892760c596be997d28c51cdc2ec121bc53ea993c7c23af10
-
SSDEEP
6144:msOZtaqC2RShTSUd2SHZI+regn4ksb1LhK:MZtaqkNSUYSHZI+regn4kKs
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3b9d1a2900223810cc0168c0ebec303c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3b9d1a2900223810cc0168c0ebec303c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
JaffaCakes118_3b9d1a2900223810cc0168c0ebec303c
-
Size
224KB
-
MD5
3b9d1a2900223810cc0168c0ebec303c
-
SHA1
f2856930c0590a6fddc76b1eb520473bb31c34e3
-
SHA256
7854d2a4eee142a4382472dfe90a063eb41ff1957e3186dedc146b070831e06f
-
SHA512
7fcb2b40b0b4d19aa8750cc2bea364d63828960052ee9f16517f9dba399c502571ca09d8215f43f4892760c596be997d28c51cdc2ec121bc53ea993c7c23af10
-
SSDEEP
6144:msOZtaqC2RShTSUd2SHZI+regn4ksb1LhK:MZtaqkNSUYSHZI+regn4kKs
-
Gh0st RAT payload
-
Gh0strat family
-
UAC bypass
-
Server Software Component: Terminal Services DLL
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks whether UAC is enabled
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
2