Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe
-
Size
74KB
-
MD5
3c060c2b76b7c089e755297b9c057375
-
SHA1
57f130235e8963c85f3d5b92285f67edaabd8bd6
-
SHA256
8eead0f0af5510317193074ddc27855639bddaa47b993bb9a6c720d12516ac66
-
SHA512
2ae93835e7e26409282d49c8acf34b81e3ae83df117cad5364b24fe17912dc09ff8839a6c066480b8527958797095f41f50ce3453c328e8ec7992edc6de5f3aa
-
SSDEEP
1536:R2XN82yFpOqYIBMa/VhVjBQEd20rXak8bc3CbW9jURbncEX0bEwMQF0NiyHhMB:RgK2ypOqlBx9FBq9bcyS9jubc7bXnF08
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000012117-4.dat family_gh0strat behavioral1/memory/1992-6-0x0000000000400000-0x0000000000441000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\fastuserswitchingcompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\ntfastuserswitchingcompatibility.dll" JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe -
Loads dropped DLL 1 IoCs
pid Process 2300 svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntfastuserswitchingcompatibility.dll.del JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe File opened for modification C:\Windows\SysWOW64\ntfastuserswitchingcompatibility.dll JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe File opened for modification C:\Windows\SysWOW64\d2f5ca0e.del JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c060c2b76b7c089e755297b9c057375.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
PID:1992
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5b48c5e7065370a8f2d24d43a2d7f47b2
SHA1a19bec8ec3522def1215fc7f8f60694c3dbafce7
SHA2563a9ee4890611243c98b6a99ea584cb8507b487662c2a662273d5b7400ef31a28
SHA51228bef05029892353afa2a3e77cd2ee8f8de0883bca42f5c2f2d135dbf1921cc7dc879451f35371c1b6453beaa55679d94d2423905a9a3a53a51ba81e8e7793b9