Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 02:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe
-
Size
261KB
-
MD5
4627e0eb368db3078c894b88e7d54b38
-
SHA1
2551dc90603c992c9024b0b0e7d951c28fd73a6a
-
SHA256
27cf6d1e0539c39fd8b37e873ce5081911d35ddbd24965d2def17b950f7422f0
-
SHA512
f3eb4210dcfae7ad61ae28bb96b92e4290e8270bec24bc1b5294cef0ad0ad37dde1b3b22f07e39567449a7579a4f10bcafdd4aca33e1ac2f28843c6fc876d791
-
SSDEEP
6144:34lRkAehaKuqT+Fz0LI2h1YHJO5mjIiZZuhB+UfDshZh4N:3kWAehJuqT+kYOQc3hB+UfoZS
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3832-20-0x00000000005F0000-0x0000000000610000-memory.dmp family_gh0strat -
Gh0strat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe -
Executes dropped EXE 2 IoCs
pid Process 2124 KwjDmf.exe 3832 MSUpdates.exe -
Loads dropped DLL 1 IoCs
pid Process 3832 MSUpdates.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\2011 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File created C:\Windows\SysWOW64\2011\__tmp_rar_sfx_access_check_240626781 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File created C:\Windows\SysWOW64\2011\xxx.jpg JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File opened for modification C:\Windows\SysWOW64\2011\xxx.jpg JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File created C:\Windows\SysWOW64\2011\KwjDmf.exe JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File opened for modification C:\Windows\SysWOW64\2011\KwjDmf.exe JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe File created C:\Windows\SysWOW64\billlog.dat MSUpdates.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsUpdate\enlpu.dll KwjDmf.exe File created C:\Program Files (x86)\WindowsUpdate\MSUpdates.exe KwjDmf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSUpdates.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KwjDmf.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe 3832 MSUpdates.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe Token: SeShutdownPrivilege 3832 MSUpdates.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2124 4416 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 83 PID 4416 wrote to memory of 2124 4416 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 83 PID 4416 wrote to memory of 2124 4416 JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe 83 PID 2124 wrote to memory of 3832 2124 KwjDmf.exe 84 PID 2124 wrote to memory of 3832 2124 KwjDmf.exe 84 PID 2124 wrote to memory of 3832 2124 KwjDmf.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4627e0eb368db3078c894b88e7d54b38.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\2011\KwjDmf.exe"C:\Windows\system32\2011\KwjDmf.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\WindowsUpdate\MSUpdates.exefuck0073⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5c02c72c5d403c863e7db9ffed8d1349d
SHA1f450415234c2d1feba88b4ba27844a87036afd6b
SHA2562f65957a4d77d4d04a058c715ed3599031dc3d3757d6a05343b76f5238d36eb6
SHA5129264b2e63c8bd32cb4ddf5c9c5f90a34b9bd165572db87340d311bb05ccef66e75f534312c2107734cef4d46071549e287e98bbc4052f889d19b02b6205ab8ba
-
Filesize
162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
80KB
MD50901ab3ee78d8cdaf5a29ba0f42025df
SHA1bad10c2383a858b043af3b59cd524f696ba3f381
SHA256abf1fb8458ae262e3466481984ef85c8006235c7c0bb2c530dfb9c05ff3245e8
SHA51202641e36edfbf0c509945634363f067d1cb1613d3228ad1ec3ac730966fb0476ce04c9b2c521491c84afdea723aaa6e25dc120b146df8ef5ad0037799fe695c3
-
Filesize
315KB
MD5b921bc20956b933e704d6ab938736a36
SHA1aafd9f393e9792c759b24d85da0d1d44c744d930
SHA256e126f021881daff79636126967c10e1d338af5930db2ba1c0fe03a340eca5d8f
SHA512c8a1f88f85e797315937807d4d4b363ea2ddaa2d551efb76c119a7e0061e6b9af13314808e63f2fb9c53341c761a79e9ebeb2646e730cbb69099dc1462764deb