Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 02:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe
-
Size
261KB
-
MD5
4627e0eb368db3078c894b88e7d54b38
-
SHA1
2551dc90603c992c9024b0b0e7d951c28fd73a6a
-
SHA256
27cf6d1e0539c39fd8b37e873ce5081911d35ddbd24965d2def17b950f7422f0
-
SHA512
f3eb4210dcfae7ad61ae28bb96b92e4290e8270bec24bc1b5294cef0ad0ad37dde1b3b22f07e39567449a7579a4f10bcafdd4aca33e1ac2f28843c6fc876d791
-
SSDEEP
6144:34lRkAehaKuqT+Fz0LI2h1YHJO5mjIiZZuhB+UfDshZh4N:3kWAehJuqT+kYOQc3hB+UfoZS
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1300-27-0x0000000000260000-0x0000000000280000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 2 IoCs
pid Process 2092 KwjDmf.exe 1300 MSUpdates.exe -
Loads dropped DLL 4 IoCs
pid Process 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 2092 KwjDmf.exe 1300 MSUpdates.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\2011 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File created C:\Windows\SysWOW64\2011\__tmp_rar_sfx_access_check_259433937 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File created C:\Windows\SysWOW64\2011\xxx.jpg JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File opened for modification C:\Windows\SysWOW64\2011\xxx.jpg JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File created C:\Windows\SysWOW64\2011\KwjDmf.exe JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File opened for modification C:\Windows\SysWOW64\2011\KwjDmf.exe JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File created C:\Windows\SysWOW64\billlog.dat MSUpdates.exe File opened for modification C:\Windows\SysWOW64\2011\xxx.jpg DllHost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsUpdate\enlpu.dll KwjDmf.exe File created C:\Program Files (x86)\WindowsUpdate\MSUpdates.exe KwjDmf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KwjDmf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSUpdates.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe 1300 MSUpdates.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe Token: SeShutdownPrivilege 1300 MSUpdates.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2812 DllHost.exe 2812 DllHost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2092 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 30 PID 2540 wrote to memory of 2092 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 30 PID 2540 wrote to memory of 2092 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 30 PID 2540 wrote to memory of 2092 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 30 PID 2540 wrote to memory of 2092 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 30 PID 2540 wrote to memory of 2092 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 30 PID 2540 wrote to memory of 2092 2540 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 30 PID 2092 wrote to memory of 1300 2092 KwjDmf.exe 31 PID 2092 wrote to memory of 1300 2092 KwjDmf.exe 31 PID 2092 wrote to memory of 1300 2092 KwjDmf.exe 31 PID 2092 wrote to memory of 1300 2092 KwjDmf.exe 31 PID 2092 wrote to memory of 1300 2092 KwjDmf.exe 31 PID 2092 wrote to memory of 1300 2092 KwjDmf.exe 31 PID 2092 wrote to memory of 1300 2092 KwjDmf.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\2011\KwjDmf.exe"C:\Windows\system32\2011\KwjDmf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\WindowsUpdate\MSUpdates.exefuck0073⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD590c2e66640ea6ec0c0722599fac6320f
SHA111a4d837fa5cbe064940be21ccacb6f7f1371610
SHA256e63a03109f047b52260386ba285076ec207e1c943985e0b74d403811366c4a62
SHA512387029892d8c0927f52756b6805aac2d6aef60af597b959b5106fb9048e1eec5471e3c7d737cb7abe475ce9c0800437761f16db5bffc9f96c20447b80d38a69e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\ips138[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
315KB
MD5b921bc20956b933e704d6ab938736a36
SHA1aafd9f393e9792c759b24d85da0d1d44c744d930
SHA256e126f021881daff79636126967c10e1d338af5930db2ba1c0fe03a340eca5d8f
SHA512c8a1f88f85e797315937807d4d4b363ea2ddaa2d551efb76c119a7e0061e6b9af13314808e63f2fb9c53341c761a79e9ebeb2646e730cbb69099dc1462764deb
-
Filesize
140KB
MD5c02c72c5d403c863e7db9ffed8d1349d
SHA1f450415234c2d1feba88b4ba27844a87036afd6b
SHA2562f65957a4d77d4d04a058c715ed3599031dc3d3757d6a05343b76f5238d36eb6
SHA5129264b2e63c8bd32cb4ddf5c9c5f90a34b9bd165572db87340d311bb05ccef66e75f534312c2107734cef4d46071549e287e98bbc4052f889d19b02b6205ab8ba
-
Filesize
80KB
MD50901ab3ee78d8cdaf5a29ba0f42025df
SHA1bad10c2383a858b043af3b59cd524f696ba3f381
SHA256abf1fb8458ae262e3466481984ef85c8006235c7c0bb2c530dfb9c05ff3245e8
SHA51202641e36edfbf0c509945634363f067d1cb1613d3228ad1ec3ac730966fb0476ce04c9b2c521491c84afdea723aaa6e25dc120b146df8ef5ad0037799fe695c3