Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 15:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe
-
Size
518KB
-
MD5
4128e44f1d14b6ba04ac744ad434d402
-
SHA1
33efef5e8c9c48c3be35612af6d0c7ac9797d736
-
SHA256
00a694cdbe727236aacdcebbf78d079f7556be71f95dcab9efa2a49454cad8b7
-
SHA512
7fa340e65a1151b026e0aca5334dbb8d501688ee42f77f47e21935d5877cb1f51277b5dccf88af277cd8517e50e46a8e2d23705e2288ee75976beed16b15044a
-
SSDEEP
6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQdu50CnP3xIxHIYP:kbB5jfgexjrOA9NRPmxwX/itF/
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/files/0x0003000000012000-19.dat family_gh0strat behavioral1/memory/2704-27-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/1420-28-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat behavioral1/memory/1420-45-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat behavioral1/memory/2704-47-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 1748 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2704 qiuqiu.exe 3008 qiuqiu.exe -
Loads dropped DLL 11 IoCs
pid Process 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 2704 qiuqiu.exe 2704 qiuqiu.exe 2704 qiuqiu.exe 2704 qiuqiu.exe 2704 qiuqiu.exe 2704 qiuqiu.exe 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 3008 qiuqiu.exe 3008 qiuqiu.exe 3008 qiuqiu.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 qiuqiu.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Common Files\maomao.dll JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe File created C:\Program Files\Common Files\qiuqiu.dll JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe File created C:\Program Files\Common Files\qiuqiu.exe JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe File opened for modification C:\Program Files\Common Files\qiuqiu.exe JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiuqiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiuqiu.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qiuqiu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz qiuqiu.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1} qiuqiu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32\ = "C:\\Program Files\\Common Files\\qiuqiu.dll" qiuqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32 qiuqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID qiuqiu.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 qiuqiu.exe 2704 qiuqiu.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2704 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 30 PID 1420 wrote to memory of 2704 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 30 PID 1420 wrote to memory of 2704 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 30 PID 1420 wrote to memory of 2704 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 30 PID 1420 wrote to memory of 2704 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 30 PID 1420 wrote to memory of 2704 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 30 PID 1420 wrote to memory of 2704 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 30 PID 1420 wrote to memory of 3008 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 31 PID 1420 wrote to memory of 3008 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 31 PID 1420 wrote to memory of 3008 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 31 PID 1420 wrote to memory of 3008 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 31 PID 1420 wrote to memory of 3008 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 31 PID 1420 wrote to memory of 3008 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 31 PID 1420 wrote to memory of 3008 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 31 PID 3008 wrote to memory of 1596 3008 qiuqiu.exe 32 PID 3008 wrote to memory of 1596 3008 qiuqiu.exe 32 PID 3008 wrote to memory of 1596 3008 qiuqiu.exe 32 PID 3008 wrote to memory of 1596 3008 qiuqiu.exe 32 PID 3008 wrote to memory of 1596 3008 qiuqiu.exe 32 PID 3008 wrote to memory of 1596 3008 qiuqiu.exe 32 PID 3008 wrote to memory of 1596 3008 qiuqiu.exe 32 PID 1420 wrote to memory of 1748 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 34 PID 1420 wrote to memory of 1748 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 34 PID 1420 wrote to memory of 1748 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 34 PID 1420 wrote to memory of 1748 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 34 PID 1420 wrote to memory of 1748 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 34 PID 1420 wrote to memory of 1748 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 34 PID 1420 wrote to memory of 1748 1420 JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4128e44f1d14b6ba04ac744ad434d402.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files\Common Files\qiuqiu.exe"C:\Program Files\Common Files\qiuqiu.exe" "C:\Program Files\Common Files\maomao.dll" ServiceMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Documents and Settings\qiuqiu.exe"C:\Documents and Settings\qiuqiu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\DOCUME~1\qiuqiu.exe3⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.1MB
MD5b4bba4847fe75772f94968aebcf3d617
SHA1b387fba5da517c980ab95875aa43d75e79adb93d
SHA256d5e726d2309e9173fb97dd3c202e604d79101a0dcdadeb5e8c832e9605d3f81c
SHA51299f4cf09961376b8dbf459cbe01070dfaeeddef6761a208b54fd7eef8ffbee230fb0a069817ad2c307194bcd87d5d746f2ac3474f11c184296f6f22e886ccbdc
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
24.0MB
MD50c0570b0085b25c08cab1b160334cf24
SHA16f66a64c5403a8487c00d5209e5ba0a839bbaa82
SHA256624887e8abeec4a2b772cbf74642f3c2df5d0c43971ab1c07e738f9e1d68a0d3
SHA5126e7d1ddde7b7e2b95c4ad56d29568eb5058462a044a7f064cf9c77bc16eef6066b11ee8c4a7d629c40659befaca4866fe4c73d4058cd2728352caec9b2c33a09