Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 11:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe
-
Size
96KB
-
MD5
4a3857ce4008227d79e9b340e734ba87
-
SHA1
511f21dc802a3da638d13a2b03d7c3dc3e1e1a93
-
SHA256
4f9c2f7f95bb30f624dbc49c9e69b09e84620aa76fdf47c14b1fb334b5a224be
-
SHA512
5be43dc7514fee7254b321bc01144f0eddcf18da817f144280fc9b388eb92a5aa2d4b38f41c2122eac0830cf1dc873de320d103791a09971786d9c470d68e5a8
-
SSDEEP
1536:jSFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prnUqiG05Q:jYS4jHS8q/3nTzePCwNUh4E9nDih5Q
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb5-15.dat family_gh0strat behavioral2/memory/3232-17-0x0000000000400000-0x000000000044E2CC-memory.dmp family_gh0strat behavioral2/memory/3392-20-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/3556-25-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/3828-30-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 3232 ildrvgdivt -
Executes dropped EXE 1 IoCs
pid Process 3232 ildrvgdivt -
Loads dropped DLL 3 IoCs
pid Process 3392 svchost.exe 3556 svchost.exe 3828 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\ghxlslwcfm svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\gpmeboaarh svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\gxaxjrcxfd svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 940 3392 WerFault.exe 83 2136 3556 WerFault.exe 87 2012 3828 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ildrvgdivt Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3232 ildrvgdivt 3232 ildrvgdivt -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 3232 ildrvgdivt Token: SeBackupPrivilege 3232 ildrvgdivt Token: SeBackupPrivilege 3232 ildrvgdivt Token: SeRestorePrivilege 3232 ildrvgdivt Token: SeBackupPrivilege 3392 svchost.exe Token: SeRestorePrivilege 3392 svchost.exe Token: SeBackupPrivilege 3392 svchost.exe Token: SeBackupPrivilege 3392 svchost.exe Token: SeSecurityPrivilege 3392 svchost.exe Token: SeSecurityPrivilege 3392 svchost.exe Token: SeBackupPrivilege 3392 svchost.exe Token: SeBackupPrivilege 3392 svchost.exe Token: SeSecurityPrivilege 3392 svchost.exe Token: SeBackupPrivilege 3392 svchost.exe Token: SeBackupPrivilege 3392 svchost.exe Token: SeSecurityPrivilege 3392 svchost.exe Token: SeBackupPrivilege 3392 svchost.exe Token: SeRestorePrivilege 3392 svchost.exe Token: SeBackupPrivilege 3556 svchost.exe Token: SeRestorePrivilege 3556 svchost.exe Token: SeBackupPrivilege 3556 svchost.exe Token: SeBackupPrivilege 3556 svchost.exe Token: SeSecurityPrivilege 3556 svchost.exe Token: SeSecurityPrivilege 3556 svchost.exe Token: SeBackupPrivilege 3556 svchost.exe Token: SeBackupPrivilege 3556 svchost.exe Token: SeSecurityPrivilege 3556 svchost.exe Token: SeBackupPrivilege 3556 svchost.exe Token: SeBackupPrivilege 3556 svchost.exe Token: SeSecurityPrivilege 3556 svchost.exe Token: SeBackupPrivilege 3556 svchost.exe Token: SeRestorePrivilege 3556 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeRestorePrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeSecurityPrivilege 3828 svchost.exe Token: SeSecurityPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeSecurityPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeSecurityPrivilege 3828 svchost.exe Token: SeBackupPrivilege 3828 svchost.exe Token: SeRestorePrivilege 3828 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1804 wrote to memory of 3232 1804 JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe 82 PID 1804 wrote to memory of 3232 1804 JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe 82 PID 1804 wrote to memory of 3232 1804 JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
\??\c:\users\admin\appdata\local\ildrvgdivt"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a3857ce4008227d79e9b340e734ba87.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_4a3857ce4008227d79e9b340e734ba87.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 7842⤵
- Program crash
PID:940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3392 -ip 33921⤵PID:3092
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 8842⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3556 -ip 35561⤵PID:4316
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 10402⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3828 -ip 38281⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.4MB
MD52e48f02894fa6bc8286601a78b3849e3
SHA1de926d1abd9fba3b49dce5cde59c6a0fe240c6cf
SHA2567fd228863acdbd044205dc51324ee42def58f1fc93b0144807ab1b38c75aca25
SHA512c2d95ce50a2c5b5368ba828925cedfcb9f96b748613eea583b8b6ba3b3940c52d7dbfe8cf500ac2deb76fcd14dd0d6edef8c65a23e1c359cd54eefa092465488
-
Filesize
204B
MD5d99f56df99f16c9378801d40bd80ef10
SHA135c1b787944da85c1860883e248068839eeae501
SHA2564b4d9d6ba62e9c3735c3bfa892857e61a0c7c3d4093b70d599d442cd4a444017
SHA51290cfb5d8123f2447e4950cb1c480fa903dbc65bdaceeea2e429483388a533e8a0e986fa3c066f889f4cd309d0d460ad2ad0153a0c7ad558bf798c2eddbbac069
-
Filesize
306B
MD50841bdf303c9b1301dda059a703e066f
SHA12eefc04ef6133871a9b7f8ce96e3b2a0a42cba44
SHA2565ff7619fefb729108f38e77f475d6cabfed337500a549dee8cf7c54a7d839d73
SHA512645af33c56db7277ce9c4983cbcc455ea7d76312be33c09f404dabb3e670292068e8adffe88b67c6109d2c1e450b9f8d0574dbf3a2892415f3d03b3b0b7f2eec
-
Filesize
22.0MB
MD53c82c335a3e95f38bd01a6e5cf963d31
SHA1f20d484fb6fadd4e676d035e98eba581d5d6e665
SHA256ef3e58a9c5a9840880108f2a2564b0efb88e29a84c8b5c4713d5173711b4bc13
SHA512cf06e3ba27bfdd71894cd25bad26eb7903fa9307247e35383b29933d68135ec3b8a21d4736e6db2027b0c858d608a7a403dbdf848809fecbd5b68c73650c6af7