Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 10:27
Behavioral task
behavioral1
Sample
JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe
-
Size
251KB
-
MD5
49d79e5755b7e017171b88114e96dff4
-
SHA1
83c0ca7c3818703f37fde49b30ad74d48576d6cd
-
SHA256
d470f1478bb30da81214d07d734f518b41cb94175126235a71a18711d5eb65b1
-
SHA512
97cef2851ffa95272e9a4227cf7b19d6005e31d6de04be34bf306c70278167b4a9584738e34f7516183443c2a83895df6ff07a7a7ff1d1142afcb90cd3b2ea1c
-
SSDEEP
3072:vlrH2jK+6lRdC9JoXMsJEYQJvMnTST/Okcw3QEe5dx7KFFh:vUK+6lvCUXqY2UT6Kwg95Gl
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/3012-0-0x0000000000400000-0x0000000000440000-memory.dmp family_gh0strat behavioral2/memory/3012-4-0x0000000000400000-0x0000000000440000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023cb5-5.dat family_gh0strat behavioral2/memory/4316-7-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral2/memory/4316-8-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 4316 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4316 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe 4316 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4316 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3012 wrote to memory of 5088 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 82 PID 3012 wrote to memory of 5088 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 82 PID 3012 wrote to memory of 5088 3012 JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe 82 PID 5088 wrote to memory of 4316 5088 cmd.exe 84 PID 5088 wrote to memory of 4316 5088 cmd.exe 84 PID 5088 wrote to memory of 4316 5088 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49d79e5755b7e017171b88114e96dff4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd.exe /c rundll32.exe C:\Windows\temp\cmss.dat hi2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\temp\cmss.dat hi3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:4316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD560f369ac8c5c7647b0d1f63787307262
SHA10d1f320676636b06726480e314b40981cb517454
SHA256c184dd9c3eec2198b26ae98ed5c3f01d9a5489d70ee6be2ba32d353f64995027
SHA512f5bd2ce8a8dec619015e413335ae1855cf7df303f4c26c68ad0cff4aac87557669f854bbb092098df1d48d4a99c9e0b173dff4848074ecf987b076b79a04d982