Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe
-
Size
196KB
-
MD5
3cbdb5d68450a4933c13c55475152057
-
SHA1
860c79c8964fa9d5038b12ac203bfb5050f89c1a
-
SHA256
2a2f212aca54efda17094e77748e98d13d0b0fded5ddd6623d815084ed59abef
-
SHA512
876acdca3a52e56aaab8724e5d9628c622988b1b975eecc7227dc18d2a4af54d7d8a6e9ef4e5f2e1572aa1bfe1618c7d9fa7175839aa14dd7f28a9e4e608aedc
-
SSDEEP
3072:1Hun0evOvtYzonqSioDXxbuE9w2qbXUeZPtrQ/a/4q7yjlZV:BI0evOvtoSiodbuYzqDvZC/a4qcfV
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4908-10-0x0000000000400000-0x0000000000432800-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 4908 hwuuvoogjj -
Executes dropped EXE 1 IoCs
pid Process 4908 hwuuvoogjj -
Program crash 1 IoCs
pid pid_target Process procid_target 528 4908 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwuuvoogjj -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4908 hwuuvoogjj 4908 hwuuvoogjj -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4908 hwuuvoogjj Token: SeBackupPrivilege 4908 hwuuvoogjj Token: SeBackupPrivilege 4908 hwuuvoogjj Token: SeRestorePrivilege 4908 hwuuvoogjj -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2780 wrote to memory of 4908 2780 JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe 88 PID 2780 wrote to memory of 4908 2780 JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe 88 PID 2780 wrote to memory of 4908 2780 JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\users\admin\appdata\local\hwuuvoogjj"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3cbdb5d68450a4933c13c55475152057.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_3cbdb5d68450a4933c13c55475152057.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 203⤵
- Program crash
PID:528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4908 -ip 49081⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.9MB
MD59871f18cef525c5c5045eb282a65894b
SHA119f3c63ecde9f90ad12ee6a5b67f36f91a5c9fb8
SHA256d7de4f94ab8ccd6a038a65c96ff26b49326bdc5da965c1f33b8fae09435cf53d
SHA5120348d8fdf3bd615076e5ae7edd8770fb8aef206c548fb7141ebab73a92c1e22b1c14be44cd24b73bbf225a8ff2b3ca61d899d3da6ebd06483802f2d38e6bb255