Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe
-
Size
192KB
-
MD5
42a9dd4b578bcecfbfa18fe4693c6928
-
SHA1
fe3f1af60efdaaa3f364634e834ee0f01f7f4313
-
SHA256
26e04dd833080b82ca51e3700cc3ea2ea7b615839b761d1dd7c9a42de92ca2f5
-
SHA512
1e26d41970004360a8617557e2913edc1a8d4687291bb264d98459ce9a3488f392fb12e2252d22103e83f1fa0b47519e4856e47ae63ade435343157cb99588aa
-
SSDEEP
3072:dRZaVXVpjWP+QE+GQgVSzCI9X2TxfTVTa519TM5tGHBKyrBXsHNHBZC:VaVXVpjp+6SzC0GTlpapTmkKydcHNHBZ
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0034000000015db1-3.dat family_gh0strat behavioral1/memory/2792-5-0x0000000010000000-0x0000000010028000-memory.dmp family_gh0strat behavioral1/memory/2216-6-0x0000000000400000-0x0000000000431000-memory.dmp family_gh0strat behavioral1/memory/2792-7-0x0000000010000000-0x0000000010028000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2792 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\d2f5ca0e.del JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\pgtlv\pgtlv.dll JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 30 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2977FCC-CD39-4F65-BC64-FD7272B86C6B}\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2977FCC-CD39-4F65-BC64-FD7272B86C6B}\96-3b-20-cc-81-66 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-3b-20-cc-81-66\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-3b-20-cc-81-66\WpadDecisionTime = 7048d041b88bdb01 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-3b-20-cc-81-66 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2977FCC-CD39-4F65-BC64-FD7272B86C6B}\WpadDecisionTime = 7048d041b88bdb01 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2977FCC-CD39-4F65-BC64-FD7272B86C6B}\WpadNetworkName = "Network 3" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-3b-20-cc-81-66\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2977FCC-CD39-4F65-BC64-FD7272B86C6B}\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2977FCC-CD39-4F65-BC64-FD7272B86C6B} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2216 JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe 2792 svchost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeBackupPrivilege 2216 JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe Token: SeRestorePrivilege 2216 JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe Token: SeBackupPrivilege 2792 svchost.exe Token: SeSecurityPrivilege 2792 svchost.exe Token: SeSecurityPrivilege 2792 svchost.exe Token: SeBackupPrivilege 2792 svchost.exe Token: SeSecurityPrivilege 2792 svchost.exe Token: SeBackupPrivilege 2792 svchost.exe Token: SeSecurityPrivilege 2792 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42a9dd4b578bcecfbfa18fe4693c6928.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5245703ce30f121a7607c6037840191de
SHA1c9b34c1a250b9b611bc2524d145a2f1bf2d2f2ab
SHA256d4c164c275a6de3b91af2012a0c58cee0987f3ad800d42c3ed542f2a8a3abdf5
SHA5125d234aeed89246141f7814d27abb2e551b9c426d79a89b1bfa5c9f6ba80ebc4aedc0930af321964fc817dc3592559396ccecc80816fcdc5a025c9d20450c3780