Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 01:50
Behavioral task
behavioral1
Sample
JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe
-
Size
176KB
-
MD5
3d144eac212ae1a8fd536620e37ede06
-
SHA1
18c7cb8375b94dd167801a2d89e088d5c01941e7
-
SHA256
0b33aa0c25d8606c1e51f76c1300ade0eb16a339a412e3ec1d745e75fab54715
-
SHA512
987676716769a200e794421d457d37c3cf79a21b348e6a562c6463f775bca7091ef94b897dac756b8caa98cc3eb8a8e7866619d34eda47c323722cdb193e4226
-
SSDEEP
3072:kcYcYKEzcW526y6hs6PhwtqrorsVlkTEIcy1O4F3JhMWIknqX5d+vIjc8UW:kcBYKEz557e2VroYoTU4JOWnS5d+v0cu
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000600000001e18e-17.dat family_gh0strat -
Gh0strat family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 28 3352 rundll32.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Rspdates Apxplicatioan\Parameters\ServiceDll JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe -
Deletes itself 1 IoCs
pid Process 3352 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2516 svchost.exe 3352 rundll32.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\hfsetemp.ini JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe File created C:\Windows\Svchost.txt JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe File created C:\Windows\Svchost.reg JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe 2516 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4512 JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe Token: SeRestorePrivilege 4512 JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe Token: SeDebugPrivilege 2516 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2516 wrote to memory of 3352 2516 svchost.exe 88 PID 2516 wrote to memory of 3352 2516 svchost.exe 88 PID 2516 wrote to memory of 3352 2516 svchost.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d144eac212ae1a8fd536620e37ede06.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "c:\windows\system32\winnie.cmd",EASTNOD Rspdates Apxplicatioan2⤵
- Blocklisted process makes network request
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365B
MD5d512cf61534d5cbb71de98c6e65e7fe3
SHA156dddd5d595e1ea49b88b1f4e5970b9f0ac85824
SHA2563afbfe4b8d0325e58811f788478bf53439fa26fdcbb5cd081b8a59535c749055
SHA512de306841ca0fa2a3f05b8728f1bdd3bfd459dde01313b0b3773f8d79da871f9545c2ae0ef4122f6018743825795269d7839b0cee9d0ddc260eaa0d1e3852a74c
-
Filesize
1.1MB
MD54281a93376892c60a50c4a9c16005069
SHA1f0306ffbb938e60699d15a861da6e90891cd66aa
SHA25634f3368b8e0f09bc87ad5027a880cf1cfd21e351b7182cd77c2165b2aa4f00a7
SHA512a36e733e86b7e631f88c364f9b960e4ee0334a53eacf1be657dd000a8bff2c76832e325e363bec620b2eb08106eec77fc59e1bf5b169c0d2f7f738e5956ad13e