Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 06:44
Behavioral task
behavioral1
Sample
JaffaCakes118_3e8c345b92f1092056c0996ecb34aaf0.dll
Resource
win7-20240729-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_3e8c345b92f1092056c0996ecb34aaf0.dll
-
Size
241KB
-
MD5
3e8c345b92f1092056c0996ecb34aaf0
-
SHA1
e0284c078b2b5210cf5f6ba7b1a3d9aa169ed76f
-
SHA256
f244392fbc333dad8e426b9a9c3897f84653792781b8a7ec0f5d889789ad2620
-
SHA512
f3715db8e9ca4f7bd7176d75c838e2749f9886c5aab8b53a986bf960b4616137d77280378ce6cd1ffff45648040741aa71a8cf2322e7ef2fdc9cd2c0033cd708
-
SSDEEP
6144:AQCW/YIC2uO67l+zaN7jfouRHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHU:AQC9U+Ra4ouq
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1896-1-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1896 2172 rundll32.exe 30 PID 2172 wrote to memory of 1896 2172 rundll32.exe 30 PID 2172 wrote to memory of 1896 2172 rundll32.exe 30 PID 2172 wrote to memory of 1896 2172 rundll32.exe 30 PID 2172 wrote to memory of 1896 2172 rundll32.exe 30 PID 2172 wrote to memory of 1896 2172 rundll32.exe 30 PID 2172 wrote to memory of 1896 2172 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e8c345b92f1092056c0996ecb34aaf0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e8c345b92f1092056c0996ecb34aaf0.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1896
-