Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 04:08

General

  • Target

    JaffaCakes118_46b8c6e121b543f1f32ddf3e03e6e23c.exe

  • Size

    96KB

  • MD5

    46b8c6e121b543f1f32ddf3e03e6e23c

  • SHA1

    776d5915dcaaf8960ef8c1b197b022c9a34f512f

  • SHA256

    8f9bf1ea83892e542a0f49c3a7f570416e215b6b0ba76335f33d03acaab0cc63

  • SHA512

    68a9b5acc2a29f271e1ac573a4d731ca701b8b2aebc18dfdc745991674e6d15a4f5d52a9884436b58357f8f26c20af42fac812b85a3b2cf13243d6a452e5508c

  • SSDEEP

    1536:4IFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prRBJIl0Hq3Ys:4aS4jHS8q/3nTzePCwNUh4E9RQ0K3Ys

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46b8c6e121b543f1f32ddf3e03e6e23c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46b8c6e121b543f1f32ddf3e03e6e23c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2692
    • \??\c:\users\admin\appdata\local\hlnnmipywp
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46b8c6e121b543f1f32ddf3e03e6e23c.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_46b8c6e121b543f1f32ddf3e03e6e23c.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2840
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Storm\update\%SESSIONNAME%\ukxyj.cc3

    Filesize

    19.0MB

    MD5

    55a88aa5b401c57d932f9b8e7a42451f

    SHA1

    2f1d78954d767845a634588584edb26aa3ca1e09

    SHA256

    75e520e65f347480a225f8e16fa491be3fe0e9ab52730aa503f1a327eefb07cc

    SHA512

    ed984551f4d796dbd4466820db65c1afb2f663e72ac55b10183a01863ba4d21752cb23b88a57615e40b3e25e8af98b9e0db93e911527e74704becfaf9b53cc33

  • \Users\Admin\AppData\Local\hlnnmipywp

    Filesize

    20.3MB

    MD5

    4ee3c14c5f644507bf0817edd8bc37b3

    SHA1

    68b510698e508c4f2ba5a04732a0ed8cf91c7ee9

    SHA256

    af438c19c0a4e933534221c01a816bf9685b75f061e389c0059ea374b47b3b28

    SHA512

    3c536896a1c83828624386e2942e65bf85e02a22f4276708f9e5218849a5ebfc230195e166c8388edacc3fea8ef668eabb7268315a9a25321cd5c1d6a8c6c4d4

  • memory/1900-19-0x0000000000140000-0x0000000000141000-memory.dmp

    Filesize

    4KB

  • memory/2692-0-0x0000000000400000-0x000000000044E31C-memory.dmp

    Filesize

    312KB

  • memory/2692-2-0x0000000000230000-0x000000000027F000-memory.dmp

    Filesize

    316KB

  • memory/2692-10-0x0000000000400000-0x000000000044E31C-memory.dmp

    Filesize

    312KB

  • memory/2840-12-0x0000000000400000-0x000000000044E31C-memory.dmp

    Filesize

    312KB

  • memory/2840-18-0x0000000000400000-0x000000000044E31C-memory.dmp

    Filesize

    312KB