Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe
-
Size
127KB
-
MD5
41fd0ccd25908d6228fb07030abdef88
-
SHA1
1f5941f868e3ba2cc48f98a1760ab28f5c6b776e
-
SHA256
e3fbd0c29925ae3cc073a21622c6a9a034f29a919733320c078a0a008fb2e471
-
SHA512
a75c16d538300800de80f8eaf989a0fd69ab077bdfc25e0be1880ed6bef7a70a490a806eee66294bba1cb066d39577d7efbe2ca395194ee64d442d580c5b0d5a
-
SSDEEP
3072:Z6ZgfcUpBg4nyyYeEDSyQZIi+y8A4X67rzOKDWCVuVgXlYL1KXOd+UOu1kf:gglXgl7uLZR+tAq67rzplIVOq1Ked+WU
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/3008-8-0x0000000010000000-0x0000000010035000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe -
Deletes itself 1 IoCs
pid Process 3008 SVCHOST.EXE -
Loads dropped DLL 1 IoCs
pid Process 3008 SVCHOST.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TaSkKiLl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE -
Kills process with taskkill 1 IoCs
pid Process 2976 TaSkKiLl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 TaSkKiLl.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2976 2724 JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe 29 PID 2724 wrote to memory of 2976 2724 JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe 29 PID 2724 wrote to memory of 2976 2724 JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe 29 PID 2724 wrote to memory of 2976 2724 JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\TaSkKiLl.exeTaSkKiLl /F /T /Im RsTrAy.ExE2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5cb1a0279ef9eace2435ddfd1aafe8e1e
SHA13119d110dc26b5e8550b3e68ccf451ec9971e37b
SHA25661da317361852bf29dff190cea5a579dd21ae6141b73bbac831241806b27d5ed
SHA512713b0d30c93f88c0422da5b13dd47a7bb6b4b3f2ac185f428bcb0d952dfaf45800f8c515e0ede862de2ee5d328891f64fc54ba4cf3482c8d6e4dfa57b08b27c6