Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 18:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll
-
Size
39KB
-
MD5
4de02857155090988f1356e6ba1fc8ff
-
SHA1
479edb1217cf8f875bd209e654f0662c4a523a74
-
SHA256
ec5173d7ace5c184707345f0257a98e1d1bd7b306c9a43f9be3d271d7754cf1b
-
SHA512
094fe77c13dba7f1cfc48f2c1f5208ebdbbef1fa91bcaf8c9b3a47c9caf5da15614045e5882f8fba5049d478a78557ebd24db70bf59a273591b6a4c1dfc932cb
-
SSDEEP
768:AgO2PxPYdJE6aJ/tMfBSuvD93e0I/1jWF7lh67SfSHSk:AZ2PaE6eMBSuvAj6wrn
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1948-3-0x0000000000170000-0x000000000019B000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1948 2336 rundll32.exe 30 PID 2336 wrote to memory of 1948 2336 rundll32.exe 30 PID 2336 wrote to memory of 1948 2336 rundll32.exe 30 PID 2336 wrote to memory of 1948 2336 rundll32.exe 30 PID 2336 wrote to memory of 1948 2336 rundll32.exe 30 PID 2336 wrote to memory of 1948 2336 rundll32.exe 30 PID 2336 wrote to memory of 1948 2336 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1948
-