Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 00:58
Behavioral task
behavioral1
Sample
JaffaCakes118_3cd09e6fdc4fb934520ae11f1bbd4a1c.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_3cd09e6fdc4fb934520ae11f1bbd4a1c.dll
-
Size
94KB
-
MD5
3cd09e6fdc4fb934520ae11f1bbd4a1c
-
SHA1
1f9789a91e4f848e0932a337ef6303c5b625d5e5
-
SHA256
fbbd316d9c15abb7c817761dbc2585b655b512ae7b79f1f26da9b7a7256d3949
-
SHA512
2e83d86235cd3ed8c24e2eeec26f759631dd02aaac8d7db4c308edcefd41667fea8231045a97bdc6f799f577d62b1d82db3f498a29947d38f8aaf798628dd374
-
SSDEEP
1536:FPU/q1TDnXo7vRAI9k1Lcd/nMLie+ccSpJfDJAp2ycnSr6hK:FPU/qxXo7iI9uLcxHe+nSpJDJA7cnS2h
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2744-3-0x0000000010000000-0x000000001001A000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2744 2448 rundll32.exe 30 PID 2448 wrote to memory of 2744 2448 rundll32.exe 30 PID 2448 wrote to memory of 2744 2448 rundll32.exe 30 PID 2448 wrote to memory of 2744 2448 rundll32.exe 30 PID 2448 wrote to memory of 2744 2448 rundll32.exe 30 PID 2448 wrote to memory of 2744 2448 rundll32.exe 30 PID 2448 wrote to memory of 2744 2448 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3cd09e6fdc4fb934520ae11f1bbd4a1c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3cd09e6fdc4fb934520ae11f1bbd4a1c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2744
-