Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 23:52
Behavioral task
behavioral1
Sample
JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe
-
Size
140KB
-
MD5
3c72e49c2c8536795c4f810b976cb421
-
SHA1
29047b1a1f022c0686d255a21a6cbf0a2d440466
-
SHA256
337baaa3b6a4ae0343397dc88efae906e93ab87acbb3c30ca1b1e739c4eaede7
-
SHA512
f156889da082a4da4b9b5e0effb09e44d8a7c1d65f4367a0354f40b34bd84efa0b054faa7c39e68e3c721d48c1f305de8cf8edc1e8eb1e70bde9fdaa63b9840a
-
SSDEEP
3072:yUg0/yQooDYONuWtu8HkBW9c0o/tSBoi/+zgb9BKf:y0yQosY+n54WGT/tSyi/TBA
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2788-0-0x0000000000400000-0x0000000000424000-memory.dmp family_gh0strat behavioral1/files/0x000800000001211a-6.dat family_gh0strat behavioral1/memory/2484-10-0x0000000000400000-0x0000000000424000-memory.dmp family_gh0strat behavioral1/memory/2788-11-0x0000000000400000-0x0000000000424000-memory.dmp family_gh0strat -
Gh0strat family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys svchost.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NtFrs\Parameters\ServiceDll = "C:\\Windows\\System32\\NtFrs.exe" JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe -
Loads dropped DLL 1 IoCs
pid Process 2812 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NtFrs.exe JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2484 2788 JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe 30 PID 2788 wrote to memory of 2484 2788 JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe 30 PID 2788 wrote to memory of 2484 2788 JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe 30 PID 2788 wrote to memory of 2484 2788 JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c72e49c2c8536795c4f810b976cb421.exe2⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD560c7e36cae84dd9dfb55a03bba02733b
SHA1d40a978817fbf6f1b1de561c9e39840f1f3aa2d2
SHA256319bd84b9597067a4e79cf284c1b92ab13a3032ad0b089a2ec767a4ff743a217
SHA512bb091e22f2fe41c8b5a741176d02646c623d3648580bcf4c87812e7219da3dfdf5ef62f85356fe3367036c88748121bec7e1ae189bebe990624f25d764f25495