Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2025 02:53

General

  • Target

    JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe

  • Size

    261KB

  • MD5

    4627e0eb368db3078c894b88e7d54b38

  • SHA1

    2551dc90603c992c9024b0b0e7d951c28fd73a6a

  • SHA256

    27cf6d1e0539c39fd8b37e873ce5081911d35ddbd24965d2def17b950f7422f0

  • SHA512

    f3eb4210dcfae7ad61ae28bb96b92e4290e8270bec24bc1b5294cef0ad0ad37dde1b3b22f07e39567449a7579a4f10bcafdd4aca33e1ac2f28843c6fc876d791

  • SSDEEP

    6144:34lRkAehaKuqT+Fz0LI2h1YHJO5mjIiZZuhB+UfDshZh4N:3kWAehJuqT+kYOQc3hB+UfoZS

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\SysWOW64\2011\KwjDmf.exe
      "C:\Windows\system32\2011\KwjDmf.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Program Files (x86)\WindowsUpdate\MSUpdates.exe
        fuck007
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WindowsUpdate\MSUpdates.exe

    Filesize

    140KB

    MD5

    c02c72c5d403c863e7db9ffed8d1349d

    SHA1

    f450415234c2d1feba88b4ba27844a87036afd6b

    SHA256

    2f65957a4d77d4d04a058c715ed3599031dc3d3757d6a05343b76f5238d36eb6

    SHA512

    9264b2e63c8bd32cb4ddf5c9c5f90a34b9bd165572db87340d311bb05ccef66e75f534312c2107734cef4d46071549e287e98bbc4052f889d19b02b6205ab8ba

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XH3Z2ZON\ips138[1].htm

    Filesize

    162B

    MD5

    4f8e702cc244ec5d4de32740c0ecbd97

    SHA1

    3adb1f02d5b6054de0046e367c1d687b6cdf7aff

    SHA256

    9e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a

    SHA512

    21047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f

  • C:\Windows\SysWOW64\2011\KwjDmf.exe

    Filesize

    80KB

    MD5

    0901ab3ee78d8cdaf5a29ba0f42025df

    SHA1

    bad10c2383a858b043af3b59cd524f696ba3f381

    SHA256

    abf1fb8458ae262e3466481984ef85c8006235c7c0bb2c530dfb9c05ff3245e8

    SHA512

    02641e36edfbf0c509945634363f067d1cb1613d3228ad1ec3ac730966fb0476ce04c9b2c521491c84afdea723aaa6e25dc120b146df8ef5ad0037799fe695c3

  • C:\Windows\SysWOW64\2011\xxx.jpg

    Filesize

    315KB

    MD5

    b921bc20956b933e704d6ab938736a36

    SHA1

    aafd9f393e9792c759b24d85da0d1d44c744d930

    SHA256

    e126f021881daff79636126967c10e1d338af5930db2ba1c0fe03a340eca5d8f

    SHA512

    c8a1f88f85e797315937807d4d4b363ea2ddaa2d551efb76c119a7e0061e6b9af13314808e63f2fb9c53341c761a79e9ebeb2646e730cbb69099dc1462764deb

  • memory/2124-10-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2124-24-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3832-20-0x00000000005F0000-0x0000000000610000-memory.dmp

    Filesize

    128KB