Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 11:56
Behavioral task
behavioral1
Sample
JaffaCakes118_5691e040c8bb50093f146229152880fe.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5691e040c8bb50093f146229152880fe.exe
-
Size
71KB
-
MD5
5691e040c8bb50093f146229152880fe
-
SHA1
27dcf548c92ffcc7b3dccb83675bcaca76b0ee93
-
SHA256
6c00557333d5bbc08622ebd66cef57accd5dbbd18976e9ea25c927e82e557427
-
SHA512
94d30666f3ab5ef2c39947f0ab25d30de7460b2d0ee1db19c82c2db52e09307c2a827a3f369d8257fc99ef4c3f3f50baf096e26792dbbc59ead58fc857bfda97
-
SSDEEP
1536:jWZpTtLcWyeYd4//yEZc1GJf7/QP4uirys5e:+pZTvnyEZiGJ7/Qguirys5e
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0012000000018676-6.dat family_gh0strat behavioral1/memory/2420-10-0x0000000010000000-0x0000000010013000-memory.dmp family_gh0strat behavioral1/files/0x0003000000012000-13.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2672 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2672 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Niud\Prubwutia.jpg JaffaCakes118_5691e040c8bb50093f146229152880fe.exe File created C:\Program Files (x86)\Niud\Prubwutia.jpg JaffaCakes118_5691e040c8bb50093f146229152880fe.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5691e040c8bb50093f146229152880fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe 2672 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2420 JaffaCakes118_5691e040c8bb50093f146229152880fe.exe Token: SeRestorePrivilege 2420 JaffaCakes118_5691e040c8bb50093f146229152880fe.exe Token: SeBackupPrivilege 2420 JaffaCakes118_5691e040c8bb50093f146229152880fe.exe Token: SeRestorePrivilege 2420 JaffaCakes118_5691e040c8bb50093f146229152880fe.exe Token: SeBackupPrivilege 2420 JaffaCakes118_5691e040c8bb50093f146229152880fe.exe Token: SeRestorePrivilege 2420 JaffaCakes118_5691e040c8bb50093f146229152880fe.exe Token: SeBackupPrivilege 2420 JaffaCakes118_5691e040c8bb50093f146229152880fe.exe Token: SeRestorePrivilege 2420 JaffaCakes118_5691e040c8bb50093f146229152880fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5691e040c8bb50093f146229152880fe.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5691e040c8bb50093f146229152880fe.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5571edeb79b44719cbac2a1553f9cd37b
SHA14711dfcdc32af57122041bfa9f8fa0127c11d6ec
SHA256ecf5e930b93344bd96d124212d7010d04205d01d3776acadf58e8512c1ec32c9
SHA512eec707c3c66cac1e1b88d56aa75f9a186c723242a1460692069e09cee6943995466081a8db95e6c44cc7419a608d665238b2f59fdf057ffa06028e8d681664a5
-
Filesize
10.5MB
MD5ec73d92215e77640cc10ad5da5f263a2
SHA100e6e72f5fa1d645bad78aed2786a502ff63abcc
SHA256f4388c2702c449040728c0b927eb17fd3d59f06206833045523a58e70f13af1b
SHA5124dcd025c04aca652106389d0447dffcd583fe6a30557185321f3529735d67152f798a833304b1ced2e1ce718185be0158ef6ad7a080d936479deef73a00377fc
-
Filesize
99B
MD5aa90e92b9c6c7e85de1c81c175492542
SHA12b5b000243346d1f8c3180bec281e2e1da232700
SHA25607134ab5e0d2be34032e5f0782f68b8c20147180fc866b3dddacd15d36b2461b
SHA512a6dc0ae692f2dad3ee3f132f9202682cf40fbac5f2a84a1b7e4709ec449746d33487b9cd679abc7dc196a2d19fdf07ff86077b0383673f3639c187113504c6c2