Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 07:39
Behavioral task
behavioral1
Sample
JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe
-
Size
127KB
-
MD5
3d59037120950ff07b799968bdaa0b2e
-
SHA1
329e24bf7498735f36716dc68ea18346e7473d09
-
SHA256
d9042ca1df3de9146643642c994990088875d16387aa627a445b2a6bcba6c8d3
-
SHA512
2140529800150c60d2c9c68ff26d35b0816c1953332194f3d1911803f0f2a811630de401ec6e5187624813bc812a35a0636d96bf0c1722ee1dfedbf983d76051
-
SSDEEP
3072:YNRc4ShP4nOAe9gcNOQXbXTCeUd7Aflo1MslsJ2:YNK4SwsgmjTdy7Afe1Ms6
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2644-0-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat behavioral1/files/0x0008000000016edc-2.dat family_gh0strat behavioral1/memory/2644-4-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2680 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\data.dll JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\plugin_info.ini JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe 2680 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe Token: SeRestorePrivilege 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe Token: SeBackupPrivilege 2680 svchost.exe Token: SeRestorePrivilege 2680 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2768 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe 31 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe 31 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe 31 PID 2644 wrote to memory of 2768 2644 JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d59037120950ff07b799968bdaa0b2e.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5d8da2b9c39ce89921d960d87edc37f96
SHA1b1e0d8a7f4af0b5018cb55c014cef394447600fa
SHA25623193afdb23440b2273717ed99a9fbcc15390d671f005b1f94e04885492ffe35
SHA512b80f8cf3e6dabb4430a6c3899b06c1b0f546f3d38381a7b7fb0e2b31153ab470529a091730eb932d5717302d45bf53563e7e2147246a10446d459cad02e49146