Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 01:37
Behavioral task
behavioral1
Sample
JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe
-
Size
208KB
-
MD5
458988d16621bc0e15192e4b4bc44d6c
-
SHA1
5b627caf57d77e7b44608bd7c59684ce1d69f44a
-
SHA256
2b7da4dd0e3d7028d72b86f8d98a827569b0d74a973f38df3eda927b3ea0ab3b
-
SHA512
2f56a9f176068dfb88ce7f54200df94043976c90c967653e259d1ce241f240251391af2664aecb8e5d842faf068135920df22e5b7a1ff193065eadd3a11cdd2b
-
SSDEEP
3072:tfhicY1twWBWHWVKhqvEzO/V1VrNYQkCA+HFSWvF3TBftWBunob2j:125WHA9DNYtEHhvF3TBlVnobm
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x000c000000023b5b-5.dat family_gh0strat behavioral2/memory/4316-14-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/files/0x0008000000023bd9-13.dat family_gh0strat behavioral2/memory/4316-18-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 1 IoCs
pid Process 4316 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 4316 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\yjsoft.ini svchost.exe File opened for modification C:\Windows\SysWOW64\yjsoft.ini svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\FF13s.exe svchost.exe File opened for modification C:\WINDOWS\FF13s.exe svchost.exe File created C:\WINDOWS\FF12s.exe svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 512 4316 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4080 JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe 4080 JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe 4316 svchost.exe 4316 svchost.exe 4316 svchost.exe 4316 svchost.exe 4316 svchost.exe 4316 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 4316 svchost.exe Token: SeRestorePrivilege 4316 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4080 wrote to memory of 4316 4080 JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe 82 PID 4080 wrote to memory of 4316 4080 JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe 82 PID 4080 wrote to memory of 4316 4080 JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_458988d16621bc0e15192e4b4bc44d6c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 8643⤵
- Program crash
PID:512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4316 -ip 43161⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.2MB
MD56420505d720dce71caffdadc0e69c854
SHA1aa41ca05443ca8d11dcf380bc11a815922eea498
SHA256104a05133c1c1f4d3614022acf5463e904bb8c4aa4785af5d77a7f3a8a48fbc3
SHA512cdf3ce2fb7f369a9e616ca9547cda411852cbe1e0e0c05a0b6c52798792b715693489b9f4f0277e73c6f9f6be99cdcab9eb992796ddf48b2aa743663b4307280
-
Filesize
152KB
MD503a2c5f31a2d6f552282189da1d640e1
SHA1eb0752c2447abaa1ef9fdb0017c2ffc5696fbb6c
SHA256afd7541c86085f606f5b4d4256d585425c7078b4da716913c3b54e31430e1f85
SHA512271298ca99376c65fe11937322af5056a046474a1ac2310552866bc2beb555401935df02657183fb0a459d91d89310b4ede32c1e8d380f0666761788d1766ed3