Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 14:28
Behavioral task
behavioral1
Sample
JaffaCakes118_40ceacb13b97975b9f047f522c4224ac.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_40ceacb13b97975b9f047f522c4224ac.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_40ceacb13b97975b9f047f522c4224ac.exe
-
Size
112KB
-
MD5
40ceacb13b97975b9f047f522c4224ac
-
SHA1
bd65987bc4de756cf95664ab25377415b567d4f8
-
SHA256
6846c67ec37de7ebc3b6ce623ba891a130f4e9c0b9225568d9f65447d8662b66
-
SHA512
1975d99655ffb33bccea88784be43005b1b7e4ec08e91f5cade517321742464e7507d657a45f7a9c66508bbdcf1da35a463e9daf6c84bb08b52fa02e107f2728
-
SSDEEP
3072:yssaC9kw/lelEOv79GkcOBuMMbGEKUJnCHZHQ:yJaskw/clEOz9GkxMK2JnD
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral1/files/0x0036000000015f81-2.dat family_gh0strat behavioral1/memory/1772-5-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat behavioral1/memory/3068-4-0x0000000000400000-0x000000000041D000-memory.dmp family_gh0strat behavioral1/memory/1772-6-0x0000000010000000-0x000000001001B000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360svc\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\ntuser.dll" JaffaCakes118_40ceacb13b97975b9f047f522c4224ac.exe -
Deletes itself 1 IoCs
pid Process 1772 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1772 svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40ceacb13b97975b9f047f522c4224ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40ceacb13b97975b9f047f522c4224ac.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40ceacb13b97975b9f047f522c4224ac.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:3068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD590b077b4faf7b22c0ca632c9c20009ee
SHA172d0e9d035c1d252480b127200868dd83be64a10
SHA256697f7b7be2259d75939f60084accb4c367e150ef1d2169b57d4f401c69762d0d
SHA51229cb8659bfa02005b466b65d6df9420a1bcf22aaa71e4e70ac1ef40a2b83ab5214bd18ec43c92dfc7840ae857fa3ecd35c11946da3eb382adbb2e1d8ddd12195