Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 10:53
Behavioral task
behavioral1
Sample
JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246.exe
-
Size
107KB
-
MD5
3ed4ec7ffbbaa7cedf86e7da640ea246
-
SHA1
42d5cc980b54addcf4c14b348449d478c6403a5a
-
SHA256
afa25d5b2f16e3e0b5b7c1afae2b27c2cea267d6b1f42e1188c5116bd5d60866
-
SHA512
bbd0f973ec0a702149e79195b22576cacc88cbca75c08eb01e5a9e3933288cf5cb36e04c0643efdb0c10b47d0ba4fecfa0c9d5d22bddee5266ca8c7225e33c9b
-
SSDEEP
3072:iosj8C4iSyGPQYgO6gxr+I58PUcfJZsppERaTA4Tw++J+T:i9YiSyGoYgO6gxr+I5elf44RQXw+a8
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/4796-0-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral2/files/0x000a000000023c05-4.dat family_gh0strat behavioral2/memory/4796-7-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral2/memory/540-6-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat behavioral2/memory/540-8-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility360.dll" JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246.exe -
Deletes itself 1 IoCs
pid Process 540 SVCHOST.EXE -
Loads dropped DLL 1 IoCs
pid Process 540 SVCHOST.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility360.dll JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ed4ec7ffbbaa7cedf86e7da640ea246.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4796
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS -s FastUserSwitchingCompatibility1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD542e34ec16b2965498222b5e1bbf573b2
SHA15f0555ecfb61ea0fd1fd9e99224550050e38ddd8
SHA256a2e66b276617a3724f6a4ec2dd51c5f1dfdbe403c0d90df9f8603d157d303489
SHA5121e925e480a0cc50f5f47559ac581dd0c1b71e123ac6aff60bddb5fe0470a317dff6bda369cd3795e5a68ab8761e7648824332888649756cb48fff041263ed370