Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 10:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe
-
Size
114KB
-
MD5
5601bffe86ef6047bc2aa7ab7a772c19
-
SHA1
f7035206dcd98cd03fce6307a8e528198b42fd0f
-
SHA256
92c905a6d10e236b3ae0a117dfbee3a043dcdfab92d3fe21a4dae1ec4e513c35
-
SHA512
9eec71aefb60863c75c7cedf89dce90c47e8e993bf1fb8fcf4a96c11b49dee29cf4155dc94ee6909e0a0d6118d6b7d27653bee52d051c22ed6b37a76c3615f17
-
SSDEEP
3072:Jl2QhEOLfuDg0PtOqzKONqsEykRLSeP5/KcAe:SOFStZzKqqsE6ehv
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/5040-3-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/5040-4-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/5040-2-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat behavioral2/memory/5040-5-0x0000000010000000-0x000000001003B000-memory.dmp family_gh0strat -
Gh0strat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\79502F58 = "C:\\Windows\\79502F58\\svchsot.exe" JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe -
resource yara_rule behavioral2/memory/5040-0-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/5040-3-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/5040-4-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/5040-2-0x0000000010000000-0x000000001003B000-memory.dmp upx behavioral2/memory/5040-5-0x0000000010000000-0x000000001003B000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\79502F58\svchsot.exe JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe File opened for modification C:\Windows\79502F58\svchsot.exe JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2108 5040 WerFault.exe 80 4888 5040 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 2180 net.exe 536 net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe Token: SeDebugPrivilege 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5040 wrote to memory of 2180 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe 85 PID 5040 wrote to memory of 2180 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe 85 PID 5040 wrote to memory of 2180 5040 JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe 85 PID 2180 wrote to memory of 536 2180 net.exe 87 PID 2180 wrote to memory of 536 2180 net.exe 87 PID 2180 wrote to memory of 536 2180 net.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5601bffe86ef6047bc2aa7ab7a772c19.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 6042⤵
- Program crash
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 6122⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5040 -ip 50401⤵PID:2728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5040 -ip 50401⤵PID:2960