Analysis
-
max time kernel
95s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 18:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe
-
Size
96KB
-
MD5
4dd3698bc5d4fc10234127291e5afa7c
-
SHA1
db1ed73bc14463f6a9d55b9bc66dc78827fb72e1
-
SHA256
56a2a088cf33ab175f32a1de3b3a0d49c2b058fd7210231958f3f3341b1c7113
-
SHA512
985106aa01c0477cb8ecd6b6356454181c0ed20a0649b81ab35c55d40a1d98d02d7d437bd0a7c11688174426d38105d1f30b88105ddfe9a66cdd81fc5b70422e
-
SSDEEP
3072:OYS4jHS8q/3nTzePCwNUh4E9SQbrh2B3ifb:OT428q/nTzePCwG7d6S
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000d000000023b5e-15.dat family_gh0strat behavioral2/memory/456-17-0x0000000000400000-0x000000000044E2EC-memory.dmp family_gh0strat behavioral2/memory/4952-20-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/3912-25-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/5024-30-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 456 gcngibskmx -
Executes dropped EXE 1 IoCs
pid Process 456 gcngibskmx -
Loads dropped DLL 3 IoCs
pid Process 4952 svchost.exe 3912 svchost.exe 5024 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\ubnxupoaiy svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\ubnxupoaiy svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\usyfmmmcud svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 836 4952 WerFault.exe 85 1100 3912 WerFault.exe 89 3520 5024 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gcngibskmx Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 456 gcngibskmx 456 gcngibskmx -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 456 gcngibskmx Token: SeBackupPrivilege 456 gcngibskmx Token: SeBackupPrivilege 456 gcngibskmx Token: SeRestorePrivilege 456 gcngibskmx Token: SeBackupPrivilege 4952 svchost.exe Token: SeRestorePrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeSecurityPrivilege 4952 svchost.exe Token: SeSecurityPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeSecurityPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeSecurityPrivilege 4952 svchost.exe Token: SeBackupPrivilege 4952 svchost.exe Token: SeRestorePrivilege 4952 svchost.exe Token: SeBackupPrivilege 3912 svchost.exe Token: SeRestorePrivilege 3912 svchost.exe Token: SeBackupPrivilege 3912 svchost.exe Token: SeBackupPrivilege 3912 svchost.exe Token: SeSecurityPrivilege 3912 svchost.exe Token: SeSecurityPrivilege 3912 svchost.exe Token: SeBackupPrivilege 3912 svchost.exe Token: SeBackupPrivilege 3912 svchost.exe Token: SeSecurityPrivilege 3912 svchost.exe Token: SeBackupPrivilege 3912 svchost.exe Token: SeBackupPrivilege 3912 svchost.exe Token: SeSecurityPrivilege 3912 svchost.exe Token: SeBackupPrivilege 3912 svchost.exe Token: SeRestorePrivilege 3912 svchost.exe Token: SeBackupPrivilege 5024 svchost.exe Token: SeRestorePrivilege 5024 svchost.exe Token: SeBackupPrivilege 5024 svchost.exe Token: SeBackupPrivilege 5024 svchost.exe Token: SeSecurityPrivilege 5024 svchost.exe Token: SeSecurityPrivilege 5024 svchost.exe Token: SeBackupPrivilege 5024 svchost.exe Token: SeBackupPrivilege 5024 svchost.exe Token: SeSecurityPrivilege 5024 svchost.exe Token: SeBackupPrivilege 5024 svchost.exe Token: SeBackupPrivilege 5024 svchost.exe Token: SeSecurityPrivilege 5024 svchost.exe Token: SeBackupPrivilege 5024 svchost.exe Token: SeRestorePrivilege 5024 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3368 wrote to memory of 456 3368 JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe 84 PID 3368 wrote to memory of 456 3368 JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe 84 PID 3368 wrote to memory of 456 3368 JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
\??\c:\users\admin\appdata\local\gcngibskmx"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4dd3698bc5d4fc10234127291e5afa7c.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_4dd3698bc5d4fc10234127291e5afa7c.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 8122⤵
- Program crash
PID:836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4952 -ip 49521⤵PID:2092
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 11122⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3912 -ip 39121⤵PID:1576
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 10202⤵
- Program crash
PID:3520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5024 -ip 50241⤵PID:3384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.3MB
MD507caae0028d66eeb9051baa35b3701d2
SHA18a2a1754af325b9ec8d28464a3bb1829f3633096
SHA2569ea7c8d6ceb7409c4241828104407866b152afcf468839d2eee51f8b627a13f5
SHA5129f52a4c4a757832acc9d8a910b620883b7d0df5468889583bacb2225f169a87149e616969c1b258ee6ef0f16ab2a93fdb1c180fb663c226986ae9f94f77e8030
-
Filesize
202B
MD5f66f5da81d2a888bb9d6634a6c7c8f5e
SHA165bd574ea7498984067610e93cec6d0e4dd1d226
SHA256304b4494d84931742459343eaa47d4f15953f5fe0435531d1f43a27a2fd2f75a
SHA5120fd2a3b68c2b6f78269730a61e6013e56debb17e23cf49920469274aeccc6200971bf591d1f4c5e9bb1e3d48e167e5596cfc8a408b7a617783161f50da4bb231
-
Filesize
303B
MD50c608b1a313bc8b2ad8b05c166dc4441
SHA1c2a0b7bd698c5f77535944ec7503f9052ec2983c
SHA2561530ea75d8f525113805e3127a333aa7dd45312d591aa94ae4ef62a7a50c24a9
SHA512491747402b6de1f03319488957be6f55bd8b31afbd663993ac96a961aa9b551df277d5b1fa09107fd21b58f600a28d15fe9017c2fa1ac01be3089ef3d00a0b0d
-
Filesize
20.1MB
MD5aa5be1e75a52e37aa9df5c2362bb0618
SHA1796ac9505f2bd9fc206d4c77e2b590d36aaba051
SHA2565cc90e07faeb19d26644110f79ccff2c22d7ba845d6a323670169ea12ef87f16
SHA5123d523588263856c59299a5b67f788f1ce1d72547eb72de4f9e24127ad54cdd15ea375f61534a431c4c29ba8c15fcaf1ff4fa5ceb7382bc350bac48bbf22a6b3c