Analysis
-
max time kernel
91s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 03:11
Behavioral task
behavioral1
Sample
JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe
-
Size
128KB
-
MD5
3b7dce4cbbb0a774a697423cc7d69d36
-
SHA1
586bb0d5ffe1660465bf8966784c63ca7e5fbc37
-
SHA256
9fe52a7e8447d83e8b1ca124f0b09ca60cede7f265176554b002eb33e6070686
-
SHA512
38425b1bf8e51e7b5ef7756463693098104e60a3080bee88de91471906662756637f6a9acc0ecb64852bf0694eda1a7e8faf7566730cad92ab50217b858bb246
-
SSDEEP
3072:780YwOK9TSCqq6cJwXvYzyhPXXjcniFUJvIHTqHQ:7ZYwO0TSCCcJCtPjujJvu
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/844-0-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat behavioral2/files/0x0008000000023cb8-2.dat family_gh0strat behavioral2/memory/1768-4-0x0000000010000000-0x000000001001D000-memory.dmp family_gh0strat behavioral2/memory/844-5-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\360svc\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\localuser.dll" JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe -
Loads dropped DLL 3 IoCs
pid Process 1768 svchost.exe 1768 svchost.exe 1768 svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 844 JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe 844 JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3b7dce4cbbb0a774a697423cc7d69d36.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD528fa169ceb0afecd18b3961dcea90b01
SHA1e442b22f252f742cca24479d1dcda78ff957fc9c
SHA256216763e52c3f23c1f5670155fc79f4b8ebf78a02706dd416c08bc005d29f396b
SHA51201d4ed7b45953eea9a8afe9c7b9a63bbdfa58c9abc03897df0633983224a04a907d86af8fa1eee9fe20ed568cbf93a840b5df085aa0eb74282049cd7f16a6787