Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 03:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe
-
Size
93KB
-
MD5
469a623cf95b01ba60220da7dccfbb1a
-
SHA1
997e8c83e8d5ffdf81f3729470811ce9ba79ecd4
-
SHA256
36f8162d8d41854a20bf62d22a931ca4e6932d933a97c9909b07c17f62869129
-
SHA512
260ea6a1ec3e6b8e7a2a87a6a7985f823145d205791f1f03c68a511f2dcf7b314fc91b1045f1da2e7886139590ab36284a32d94d7d33bc7f2ed7121e4e5a6aba
-
SSDEEP
1536:fpFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prCSQxr:f/S4jHS8q/3nTzePCwNUh4E90xr
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000b000000023b88-15.dat family_gh0strat behavioral2/memory/368-17-0x0000000000400000-0x000000000044F000-memory.dmp family_gh0strat behavioral2/memory/1728-20-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/4524-25-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/1944-30-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 368 mcyduhmfgu -
Executes dropped EXE 1 IoCs
pid Process 368 mcyduhmfgu -
Loads dropped DLL 3 IoCs
pid Process 1728 svchost.exe 4524 svchost.exe 1944 svchost.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\mctcriwksm svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\mkiualyhfi svchost.exe File created C:\Windows\SysWOW64\mkiualyhfi svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\mtwniocfsd svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3420 1728 WerFault.exe 88 5116 4524 WerFault.exe 93 4684 1944 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcyduhmfgu Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 368 mcyduhmfgu 368 mcyduhmfgu -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 368 mcyduhmfgu Token: SeBackupPrivilege 368 mcyduhmfgu Token: SeBackupPrivilege 368 mcyduhmfgu Token: SeRestorePrivilege 368 mcyduhmfgu Token: SeBackupPrivilege 1728 svchost.exe Token: SeRestorePrivilege 1728 svchost.exe Token: SeBackupPrivilege 1728 svchost.exe Token: SeBackupPrivilege 1728 svchost.exe Token: SeSecurityPrivilege 1728 svchost.exe Token: SeSecurityPrivilege 1728 svchost.exe Token: SeBackupPrivilege 1728 svchost.exe Token: SeBackupPrivilege 1728 svchost.exe Token: SeSecurityPrivilege 1728 svchost.exe Token: SeBackupPrivilege 1728 svchost.exe Token: SeBackupPrivilege 1728 svchost.exe Token: SeSecurityPrivilege 1728 svchost.exe Token: SeBackupPrivilege 1728 svchost.exe Token: SeRestorePrivilege 1728 svchost.exe Token: SeBackupPrivilege 4524 svchost.exe Token: SeRestorePrivilege 4524 svchost.exe Token: SeBackupPrivilege 4524 svchost.exe Token: SeBackupPrivilege 4524 svchost.exe Token: SeSecurityPrivilege 4524 svchost.exe Token: SeSecurityPrivilege 4524 svchost.exe Token: SeBackupPrivilege 4524 svchost.exe Token: SeBackupPrivilege 4524 svchost.exe Token: SeSecurityPrivilege 4524 svchost.exe Token: SeBackupPrivilege 4524 svchost.exe Token: SeBackupPrivilege 4524 svchost.exe Token: SeSecurityPrivilege 4524 svchost.exe Token: SeBackupPrivilege 4524 svchost.exe Token: SeRestorePrivilege 4524 svchost.exe Token: SeBackupPrivilege 1944 svchost.exe Token: SeRestorePrivilege 1944 svchost.exe Token: SeBackupPrivilege 1944 svchost.exe Token: SeBackupPrivilege 1944 svchost.exe Token: SeSecurityPrivilege 1944 svchost.exe Token: SeSecurityPrivilege 1944 svchost.exe Token: SeBackupPrivilege 1944 svchost.exe Token: SeBackupPrivilege 1944 svchost.exe Token: SeSecurityPrivilege 1944 svchost.exe Token: SeBackupPrivilege 1944 svchost.exe Token: SeBackupPrivilege 1944 svchost.exe Token: SeSecurityPrivilege 1944 svchost.exe Token: SeBackupPrivilege 1944 svchost.exe Token: SeRestorePrivilege 1944 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4488 wrote to memory of 368 4488 JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe 83 PID 4488 wrote to memory of 368 4488 JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe 83 PID 4488 wrote to memory of 368 4488 JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\users\admin\appdata\local\mcyduhmfgu"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_469a623cf95b01ba60220da7dccfbb1a.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_469a623cf95b01ba60220da7dccfbb1a.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 11042⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1728 -ip 17281⤵PID:4072
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 9442⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4524 -ip 45241⤵PID:800
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 8882⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1944 -ip 19441⤵PID:736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.1MB
MD566dac2ed1e254a72c34950b3837382a5
SHA1dbe629a0087058bb72fb685d0b0c9aedfc17cc15
SHA2565046685d61b9946b55354deac1d5b37f2131be04b9527fdfcbb0629f2df4719c
SHA512103489f22a50b8037ccb863b25d7c4000e4c2e6502d928ca685bc8578a8a2b56de09edfd4f52e5cf4c44304f420aff28f64ef216b870666cb17ef1c5ccf2d51c
-
Filesize
202B
MD548770e8f87be83f88f5ded53a893186a
SHA18db6c5f1d846b821bfb2d996575e34bb0c0ce1ad
SHA2562a11d01b4e10794d4acac603af7325445f3d79a89a9fdde8072deaf1712ee5a5
SHA51243c5773aef83cda12a70a6eb81417008108c47c7838337f0a8e088273d36c82b33ac0e1aa4e37de727f0c3feba9d797a8c8a992ff6d95e9c43a389c16038d1e4
-
Filesize
303B
MD516740fe5b1070905abc54cacb029a77e
SHA1d537015121e594c0db07af2fd0ca88747eccb5a1
SHA256353c193688bcffba0fb41120395600d06e706f655744c9b594bbbdf2bee66187
SHA5123ec364598fa77b03d46f46accd1dfd5dd4d5cafc4d8a0c32f64f8a094fa3c8d605189d2365a72f2a6c18710edf5e70436677b226c9c45bc15caa927004199fe4
-
Filesize
22.1MB
MD555a75bf6d571e069d21d258e4653cd3b
SHA1d42c63e4146e3ecb321d34f4d90b816d7efaa01f
SHA256ae3a2111706f541c8a08b411718714a8806f49bf72862212f3556bf43e5d81f6
SHA51210f4f27d1f80287a7d29da6a57f48a1f9094ccf3c553d39590b59dbe3ff805da202e7a26312f6712aa544047f30844fca70c504e0e717797aad80ac41e63a197