Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe
Resource
win7-20250207-en
General
-
Target
JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe
-
Size
321KB
-
MD5
3be35fb0f28a5f841cd6765827785c5e
-
SHA1
eaddef60d78bc8fcfd426541453b0504748f78c9
-
SHA256
c4a0bb6d9044522198049699b416f78168fa5ac7adcf577de5471a245cfc4af0
-
SHA512
bf88d6f6f69968b84b8fa24630f9fcb044019e4b409a38f8c6801696d68713d2cd7de94b35affaaa4f742d78e17d33bfdd2eb041f6bc7ded4e2ee117c50d7c4b
-
SSDEEP
6144:p7j1MoraeUuq4H4nDWgRAkPUHtGQn8xID0DMF3GqpKHeLu1keWcw1Weqo:p/1/We+1R3PGGLxe0DbdUBceH
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/368-9-0x0000000000400000-0x0000000000478000-memory.dmp family_gh0strat behavioral2/memory/368-5-0x0000000000400000-0x0000000000478000-memory.dmp family_gh0strat behavioral2/files/0x000b000000023c62-11.dat family_gh0strat behavioral2/files/0x000e000000023c87-20.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 944 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe 944 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\FileName.jpg JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe File opened for modification C:\Windows\FileName.jpg JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe 944 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe Token: SeRestorePrivilege 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe Token: SeBackupPrivilege 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe Token: SeRestorePrivilege 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe Token: SeBackupPrivilege 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe Token: SeRestorePrivilege 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe Token: SeBackupPrivilege 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe Token: SeRestorePrivilege 368 JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3be35fb0f28a5f841cd6765827785c5e.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:368
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD50c442fcf389301e632c2c5ce2804553e
SHA1117b7727484b3e8d1c3f2505d7093b3876a8ef1b
SHA256c7d1349fe706f0d8d9600b43ff60b7cbcd6246013cf38810e3c201454315faa4
SHA512328135fb8c859137f53c5e5235c551f1c7cefa93be6f84dad6df69113de9dd6370dbcef9f9007fdeb1fe3ff25808fdc460e5691c2628619f2e96910dbc31ae14
-
Filesize
98B
MD592f148d11e97ab2028898b1426710634
SHA1e92b8358b0867efc9f700794c2fa850768324235
SHA2562d15f8e206fcb79f7511e92f590e42f65279b07916c191b3bb9cce1fdf1d2d8a
SHA5121b3f0ce88154c232494c2beaef92d9bedbfe1c75881e810f9a1298158edd9a43a8c8108c334eebcff8af4c44ce2ee80ef9545a5374edc79e642a4686dd4639bc
-
Filesize
11.0MB
MD548deb08c9935b18e4b25defd569b0a7f
SHA13aded21e9393efa7c1c38c282b30ff1dcd96de18
SHA256b50004852d3d74365cc881f190e439b03ce90fc7e8f44afc824ef00d9b7cb361
SHA512e254301b37b6f80139d43cf8589976f9af9f20584aa247c4a909b5806b148b8679b3c55c602af033383bc4f6edf3ab4ae0240b71aefd245bfa9d7e4581c462f6