Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2025, 09:05

General

  • Target

    JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe

  • Size

    188KB

  • MD5

    3f434449f3a5bdf0db446f7b9de9340e

  • SHA1

    3a2c3ed61d20e8168794422422f1ae8592164b2a

  • SHA256

    e959437b18df465a508a1fd585972be6ded86f322730c4054180520cf2f9bc5d

  • SHA512

    588c4fd25dada3801cf10609dc21346bf79d642499307841203f10c32632426bac81f7501f633e5001366665ecfa8cd07d13428d55b9603c15f9e52fac5d70a9

  • SSDEEP

    3072:HoPqsxW6PnfJ3ihBLETBkbG+KcijGvpD2SC6llrdV3BbTakQ:NsxW6PnfJ3yLs+VKcwYVlbxTak

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2760
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Server Software Component: Terminal Services DLL
    • Sets service image path in registry
    • Deletes itself
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\hxhkf.dll

    Filesize

    148KB

    MD5

    c45604d4a427c984c46db0a3f7a05b7b

    SHA1

    9dc0e052fd644f7b028d5f2b717e25f609af7374

    SHA256

    513672ac5dbf2e4dc99954f36991614b9753f2a13173d35c1ae17d43a695c326

    SHA512

    3f157b847957380687729151471aa2047840d441380670bccb830a94e9c07ddc1ad9bdf6485b85a7077959ba0457528644193d2f287245c68ca83fb2fde8640b

  • memory/2760-6-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2760-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2864-5-0x0000000010000000-0x0000000010027000-memory.dmp

    Filesize

    156KB

  • memory/2864-7-0x0000000010000000-0x0000000010027000-memory.dmp

    Filesize

    156KB