Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2025, 23:59

General

  • Target

    JaffaCakes118_49e5d3474dc002c6a13b570c9c9ce963.exe

  • Size

    123KB

  • MD5

    49e5d3474dc002c6a13b570c9c9ce963

  • SHA1

    c97d712353f66b8dbb40d77577a0cf616c929ae2

  • SHA256

    68ce04e15f2de825c1d2e7c72090c7bbe0d76fd00242af10382f56509ed1a62a

  • SHA512

    1e61adcb844a602d8eafc35730f4a7ead3e4740741efce996fa8f3828897015e7a38fa40ada4ee1cc667d252215877cab720ca6ea53a72bda233d7fc276dbe9a

  • SSDEEP

    3072:P7G1ROnV9TOLImX69Sj8vg1tFPnG82C5kUJvfHCcgqj86HU:PS1ROfTOLpX6kwKtG/QJvK8G

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49e5d3474dc002c6a13b570c9c9ce963.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49e5d3474dc002c6a13b570c9c9ce963.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2540
  • C:\Windows\SysWOW64\SVCHOST.EXE
    C:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\documents and settings\local user\ntuser.dll

    Filesize

    106KB

    MD5

    f10787fb2873a02ea1017e39a7dad355

    SHA1

    75c7e33398798a9bdcbe1828c97f5a2eba1e55a3

    SHA256

    20f744d287740d864f88f0cd1044cc93f5a4cf03072a2c666fce1c6166066083

    SHA512

    310e5b12762a8b85398e9abbd7622862b3cbe310bb90aa7be3832909c588140eea2d799d141441c4abcf770d46193ee2c34d5fb8d672c39f9f6bdfa93d7be634

  • memory/1632-5-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1632-6-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/2540-0-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/2540-3-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB