Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2025, 09:43

General

  • Target

    JaffaCakes118_497730398d40b55e7e969e8784b68a95.exe

  • Size

    220KB

  • MD5

    497730398d40b55e7e969e8784b68a95

  • SHA1

    f0a84bc368acead6be937eae9192a7e24f878e46

  • SHA256

    71543c8e405705e9bbebc3f7f0d6bb954c0f4da8e00ead618ff263ed3ba144be

  • SHA512

    f1a72f2335daec7faa3e2a97abe0ce05a4f6946dd27fd2e635b4179ad240c05d3c5d77da0bd37f0c4d9e2834b74a9deea823aa8ab4fa99d52618df8babe04ecc

  • SSDEEP

    6144:eOPj2DfX0VSn3mZJRH3pyv9i0MTUC4+OpSLWg4:r2fk42H3pkE0MTj4LSa1

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_497730398d40b55e7e969e8784b68a95.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_497730398d40b55e7e969e8784b68a95.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Program Files (x86)\Common Files\%SESSIONNAME%\A-Easy.exe
      "C:\Program Files (x86)\Common Files\%SESSIONNAME%\A-Easy.exe" /S
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • \??\c:\program files (x86)\common files\igrxkijwcu
        "C:\Program Files (x86)\Common Files\%SESSIONNAME%\A-Easy.exe" /S a -sc:\program files (x86)\common files\%sessionname%\a-easy.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\igrxkijwcu

    Filesize

    24.6MB

    MD5

    496f6b35e848dd29109b7d926f4b48ef

    SHA1

    40367cddb29fe31feeec1c42fd04d6daeed401b2

    SHA256

    a78fe9bfdeb9686c7f9770b1db38a151743d2ac628f8d3a4fdbf5a6220bd7a3e

    SHA512

    3ffa0821bfc3b79c5ed2342720d14a259f2e8b041f784aa64b135d9921761005b11509f68df1c18bb44c1cedae06904bf90d19df644ab296b64c55238f0c91b6

  • \??\c:\program files (x86)\netmeeting\%sessionname%\fnjyo.cc3

    Filesize

    24.0MB

    MD5

    4e3ad63243d82b06060fb2945c63b220

    SHA1

    c929e42d188459ebd61bbfd804883c5b0eea6126

    SHA256

    c86094ab7c64c6cc90e6211cb843f352e26fd9656911d07bc4dbd78f5ee624bf

    SHA512

    d7b22c8b19c74c702b3497e0cb691e6bbc242ba32fd0ff78ef09c10a6fe5c5332523b9779503ca68cbce1b36bb709b4630a337fc0959cf8e58f5152194f5a640

  • \Program Files (x86)\Common Files\%SESSIONNAME%\A-Easy.exe

    Filesize

    21.2MB

    MD5

    a006d9dc4a5974858f3509db67ee01c0

    SHA1

    756d7cd8f9c6f107cac1caee19ae69ffc733ab18

    SHA256

    eadbd396b7a7921fcf1c315325a91baf81a16f83712b71c53491f8eca40cad1f

    SHA512

    b1c293a21348825ddc25f9ffc2891a958e4c1c95f414401c83e2487fb16aab65593c26f7e3645012ecf07592956bc4b2382f4e63d018c28856e094268354962a

  • memory/2084-14-0x0000000004D40000-0x0000000006295000-memory.dmp

    Filesize

    21.3MB

  • memory/2188-27-0x0000000000400000-0x0000000001955000-memory.dmp

    Filesize

    21.3MB

  • memory/2188-30-0x0000000000400000-0x0000000001955000-memory.dmp

    Filesize

    21.3MB

  • memory/2188-35-0x0000000000400000-0x0000000001955000-memory.dmp

    Filesize

    21.3MB

  • memory/2796-36-0x0000000000180000-0x0000000000181000-memory.dmp

    Filesize

    4KB

  • memory/2968-13-0x0000000000400000-0x0000000001955000-memory.dmp

    Filesize

    21.3MB

  • memory/2968-28-0x0000000002180000-0x00000000036D5000-memory.dmp

    Filesize

    21.3MB

  • memory/2968-25-0x0000000000400000-0x0000000001955000-memory.dmp

    Filesize

    21.3MB

  • memory/2968-29-0x0000000002180000-0x00000000036D5000-memory.dmp

    Filesize

    21.3MB