Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe
-
Size
188KB
-
MD5
3f434449f3a5bdf0db446f7b9de9340e
-
SHA1
3a2c3ed61d20e8168794422422f1ae8592164b2a
-
SHA256
e959437b18df465a508a1fd585972be6ded86f322730c4054180520cf2f9bc5d
-
SHA512
588c4fd25dada3801cf10609dc21346bf79d642499307841203f10c32632426bac81f7501f633e5001366665ecfa8cd07d13428d55b9603c15f9e52fac5d70a9
-
SSDEEP
3072:HoPqsxW6PnfJ3ihBLETBkbG+KcijGvpD2SC6llrdV3BbTakQ:NsxW6PnfJ3yLs+VKcwYVlbxTak
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x000f000000023c3c-3.dat family_gh0strat behavioral2/memory/1056-5-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat behavioral2/memory/4776-6-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1056-7-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fastuserswitchingcompatibility\parameters\seRViCEDLl = "C:\\Windows\\system32\\atvqt.dll" JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fastuserswitchingcompatibility\parameters\seRViCEDLl = "C:\\Windows\\system32\\atvqt.dll" svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\fastuserswitchingcompatibility\ImagePath = "%SystemRoot%\\System32\\svchost.exe -k netsvcs" svchost.exe -
Deletes itself 1 IoCs
pid Process 1056 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1056 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\d2f5ca0e.del JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe File opened for modification C:\Windows\SysWOW64\atvqt.dll JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 4776 JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe 4776 JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe 1056 svchost.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 1056 svchost.exe Token: SeSecurityPrivilege 1056 svchost.exe Token: SeSecurityPrivilege 1056 svchost.exe Token: SeBackupPrivilege 1056 svchost.exe Token: SeSecurityPrivilege 1056 svchost.exe Token: SeBackupPrivilege 1056 svchost.exe Token: SeSecurityPrivilege 1056 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3f434449f3a5bdf0db446f7b9de9340e.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Server Software Component: Terminal Services DLL
- Sets service image path in registry
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5c45604d4a427c984c46db0a3f7a05b7b
SHA19dc0e052fd644f7b028d5f2b717e25f609af7374
SHA256513672ac5dbf2e4dc99954f36991614b9753f2a13173d35c1ae17d43a695c326
SHA5123f157b847957380687729151471aa2047840d441380670bccb830a94e9c07ddc1ad9bdf6485b85a7077959ba0457528644193d2f287245c68ca83fb2fde8640b