Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2025, 18:54

General

  • Target

    JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe

  • Size

    127KB

  • MD5

    41fd0ccd25908d6228fb07030abdef88

  • SHA1

    1f5941f868e3ba2cc48f98a1760ab28f5c6b776e

  • SHA256

    e3fbd0c29925ae3cc073a21622c6a9a034f29a919733320c078a0a008fb2e471

  • SHA512

    a75c16d538300800de80f8eaf989a0fd69ab077bdfc25e0be1880ed6bef7a70a490a806eee66294bba1cb066d39577d7efbe2ca395194ee64d442d580c5b0d5a

  • SSDEEP

    3072:Z6ZgfcUpBg4nyyYeEDSyQZIi+y8A4X67rzOKDWCVuVgXlYL1KXOd+UOu1kf:gglXgl7uLZR+tAq67rzplIVOq1Ked+WU

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41fd0ccd25908d6228fb07030abdef88.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Windows\SysWOW64\TaSkKiLl.exe
      TaSkKiLl /F /T /Im RsTrAy.ExE
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2976
  • C:\Windows\SysWOW64\SVCHOST.EXE
    C:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    83KB

    MD5

    cb1a0279ef9eace2435ddfd1aafe8e1e

    SHA1

    3119d110dc26b5e8550b3e68ccf451ec9971e37b

    SHA256

    61da317361852bf29dff190cea5a579dd21ae6141b73bbac831241806b27d5ed

    SHA512

    713b0d30c93f88c0422da5b13dd47a7bb6b4b3f2ac185f428bcb0d952dfaf45800f8c515e0ede862de2ee5d328891f64fc54ba4cf3482c8d6e4dfa57b08b27c6

  • memory/2724-0-0x0000000000400000-0x000000000043B058-memory.dmp

    Filesize

    236KB

  • memory/2724-7-0x0000000000400000-0x000000000043B058-memory.dmp

    Filesize

    236KB

  • memory/3008-6-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB

  • memory/3008-8-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB