Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2025 11:02

General

  • Target

    JaffaCakes118_4a2a329c3affc478eff3d4d727ea8feb.exe

  • Size

    231KB

  • MD5

    4a2a329c3affc478eff3d4d727ea8feb

  • SHA1

    78856c572ecb6c95e5acf6b5afb1ac9bd4f0c6b9

  • SHA256

    01fdb1f44e874bfcee29c131402a0f55b48fb243a0f4eb0d1fcc9c4b1ef65ab0

  • SHA512

    25ff4e40c0b9fa6279dc42c26b288ac71d1f8ca4db1fd50596154e5bcd00f09760486ee1ba06dca56ed2f0d89c7c48167266c67427aee65ea1f23b86ac3a5662

  • SSDEEP

    3072:gzmDoyz1jEhM76wcdecmNX/1lD2rM5GBQCckl/6Ri89Rv0OfHa5ne2hHi:gKD31jEhM0mNX/CbQI+ieR7/8g

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a2a329c3affc478eff3d4d727ea8feb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a2a329c3affc478eff3d4d727ea8feb.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c rundll32.exe C:\Windows\temp\cmss.dat hi
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\temp\cmss.dat hi
        3⤵
        • Blocklisted process makes network request
        • Deletes itself
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\temp\cmss.dat

    Filesize

    10.1MB

    MD5

    af533d1492ad834dd2082063ed0f417c

    SHA1

    aee776881bcfadedfff2010681a6145c38c6582f

    SHA256

    51788129915dfe7c91de18158a354d8ea5b9a00c71441df94d8902fe64b89437

    SHA512

    624f25c3cde6b8fa3d9722683156814112e98d110ca972ea65c1dfd22859e06532049a263e3c1a86611b421e6f9759765dbb68f17f61dfc7df51fc487d19cdd7

  • memory/1948-6-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/1948-7-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2212-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2212-3-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB