Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 17:07
Behavioral task
behavioral1
Sample
JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe
-
Size
156KB
-
MD5
417811564bbe489d3117fd04b338ac9b
-
SHA1
2ea1cb7e18666b7a52b1b099d2e151c7b4a35abf
-
SHA256
6be071163d6340ff98a0b9fe175f14144dbc751874b5dc5eeef8a83d91010889
-
SHA512
f0b0189ce9ef3d1259eb18c897dddbb9fae67fbe5e6c30671c01ad055924a851c94f8458c936a9219249c9b0210a01d739f0c21f4d41cf9bcf568936bf39db43
-
SSDEEP
3072:3hDj44zniIHhEF+AdDSpxXepxwiQEhiM8BKj:yqii2TIp9kxwiQEd8BA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000016df8-18.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 1932 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2308 hqoped.td -
Loads dropped DLL 1 IoCs
pid Process 2784 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\systeminf.inf JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe File opened for modification C:\Windows\SysWOW64\systeminf.inf JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe File created C:\Windows\SysWOW64\krjetttc.td JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe File created C:\Windows\SysWOW64\hqoped.td JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe File created C:\Windows\SysWOW64\applelogs.key rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runonce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grpconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqoped.td Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 2308 hqoped.td 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe 2784 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 2472 rundll32.exe Token: SeRestorePrivilege 2472 rundll32.exe Token: SeRestorePrivilege 2472 rundll32.exe Token: SeRestorePrivilege 2472 rundll32.exe Token: SeRestorePrivilege 2472 rundll32.exe Token: SeRestorePrivilege 2472 rundll32.exe Token: SeRestorePrivilege 2472 rundll32.exe Token: SeDebugPrivilege 2308 hqoped.td -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2516 wrote to memory of 3060 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 30 PID 2516 wrote to memory of 3060 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 30 PID 2516 wrote to memory of 3060 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 30 PID 2516 wrote to memory of 3060 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 30 PID 3060 wrote to memory of 2472 3060 cmd.exe 32 PID 3060 wrote to memory of 2472 3060 cmd.exe 32 PID 3060 wrote to memory of 2472 3060 cmd.exe 32 PID 3060 wrote to memory of 2472 3060 cmd.exe 32 PID 3060 wrote to memory of 2472 3060 cmd.exe 32 PID 3060 wrote to memory of 2472 3060 cmd.exe 32 PID 3060 wrote to memory of 2472 3060 cmd.exe 32 PID 2472 wrote to memory of 2484 2472 rundll32.exe 33 PID 2472 wrote to memory of 2484 2472 rundll32.exe 33 PID 2472 wrote to memory of 2484 2472 rundll32.exe 33 PID 2472 wrote to memory of 2484 2472 rundll32.exe 33 PID 2484 wrote to memory of 2284 2484 runonce.exe 34 PID 2484 wrote to memory of 2284 2484 runonce.exe 34 PID 2484 wrote to memory of 2284 2484 runonce.exe 34 PID 2484 wrote to memory of 2284 2484 runonce.exe 34 PID 2308 wrote to memory of 2784 2308 hqoped.td 37 PID 2308 wrote to memory of 2784 2308 hqoped.td 37 PID 2308 wrote to memory of 2784 2308 hqoped.td 37 PID 2308 wrote to memory of 2784 2308 hqoped.td 37 PID 2308 wrote to memory of 2784 2308 hqoped.td 37 PID 2308 wrote to memory of 2784 2308 hqoped.td 37 PID 2308 wrote to memory of 2784 2308 hqoped.td 37 PID 2516 wrote to memory of 1932 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 38 PID 2516 wrote to memory of 1932 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 38 PID 2516 wrote to memory of 1932 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 38 PID 2516 wrote to memory of 1932 2516 JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_417811564bbe489d3117fd04b338ac9b.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Documents AND Settings\apple.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Windows\system32\systeminf.inf3⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\runonce.exe"C:\Windows\system32\runonce.exe" -r4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\System32\grpconv.exe" -o5⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c apple.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\SysWOW64\hqoped.tdC:\Windows\SysWOW64\hqoped.td1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\krjetttc.td,hi2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD5e39e318e5b231fdf5f147640c71c2096
SHA15fe5815abf87c414d29babcbe914e70c062a705c
SHA2563dfb3bbbd87f29fe338b97fef70b525ed754c6b980698c426bc32156c93914e2
SHA512398b78921d487e135429672488303d7a641907c2124310a55c22cefd061f358f1c15375b7fe1a8919f0fc7423136c4241d714f312d675506bc69dea35b1dbfc4
-
Filesize
2KB
MD56054523340f99a6da8dfc1480255ca1a
SHA1354be1f2ed6abe678592e6c0a9d24423fada5830
SHA2564532c92713df61d216fe26ef754fb2f7572efb689aa85be79c2693bbe6be9805
SHA5125d9dbc8c1f04343145cd893199aa1e97489563580ebd3b5d455997805ff7026c6da2ee08d0e200666e61c8cb8df86d115e59ee8989cf0c4149295fd4636d4afa
-
Filesize
25.0MB
MD596d8433587d50db828608309a8e6bc03
SHA1178bbc14089ea63a2d0f26df45ee9b26d7681d99
SHA2568f4daee3b3412892331739932a70b1fb609714d2ce341294b596e662253f0b05
SHA5125836a1e2373d8caf22959281d24b4f6b30fb191883cebcfe4e4ad3ddb547dab869e4ca2d02ca7ccf3ceb0ab334809ad97bd65689f6973ed7aea2f08ac2abbfc1
-
Filesize
25.1MB
MD556410f615bfff48fec3742317e491019
SHA10ba4e7077cee64c53bca5f5a7ad183b14a352330
SHA2561dc0bc23781dd19226f5a3e47225df041e7cdfcc96f6feb6587b104a0a2754fd
SHA512ded2358e1085f9bb0f8d34cc7c23db182902ac8449fb8c1d9f08610cda844901e90f24ff41c7e1abc2972e10cf924ad450f0545705ca55160478d3d2b19e387f
-
Filesize
360B
MD5fd1259897770d5fee8ea3b7d0c8d8b4a
SHA12c1a6190900034c2d962cff4ecf6cc58cd939e8f
SHA2569e47956999a8516ff1c846da9f68fb9c02563497117bdc4be9a9319f7da08d2e
SHA512ac3d4f3b2f6ef95779145931f2143ed46aee8a6e720d46e1678ae8c7f2e6dcac605382434a17ae845dcaea7a7d3ee6a1000274d0ff92b0ec6404f676eb3f6467