Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe
-
Size
126KB
-
MD5
49d3e62c23c065e2682c4cc073d6e4ef
-
SHA1
7d54ae1b6fbbeff6e5db1a7bafb72f9b56114b4a
-
SHA256
5a3cbb5b117a6af5a470f06677af7086fedf25c6b00826b83a7877de251d2fa7
-
SHA512
7c1741a6fd7407b8385b806185305c8ede4afcdd2eaa11f4381852c1c76e9e8405e2e0a9abba92e89f6f909af51214fb2aeff935f67a265dacf2ed8014ccebc7
-
SSDEEP
3072:uWjdua1hf1papv4/4ArMVUtqzzDXP9ehTcnmZ:bVD/4ArhAznlOG
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1916-15-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral1/memory/2000-21-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral1/memory/2000-23-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral1/memory/2000-24-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral1/memory/1916-26-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral1/memory/2000-27-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral1/memory/1916-32-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral1/memory/2000-33-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\210107218\Parameters\ServiceDll = "C:\\Windows\\system32\\210107218.dll" JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe -
Deletes itself 1 IoCs
pid Process 2920 cmd.exe -
Loads dropped DLL 5 IoCs
pid Process 1916 svchost.exe 2000 rundll32.exe 2000 rundll32.exe 2000 rundll32.exe 2000 rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\210107218.dll JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe File opened for modification C:\Windows\SysWOW64\210107218.dll JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2076 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe Token: SeDebugPrivilege 1916 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2920 2076 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe 31 PID 2076 wrote to memory of 2920 2076 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe 31 PID 2076 wrote to memory of 2920 2076 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe 31 PID 2076 wrote to memory of 2920 2076 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe 31 PID 1916 wrote to memory of 2000 1916 svchost.exe 32 PID 1916 wrote to memory of 2000 1916 svchost.exe 32 PID 1916 wrote to memory of 2000 1916 svchost.exe 32 PID 1916 wrote to memory of 2000 1916 svchost.exe 32 PID 1916 wrote to memory of 2000 1916 svchost.exe 32 PID 1916 wrote to memory of 2000 1916 svchost.exe 32 PID 1916 wrote to memory of 2000 1916 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k 2101072181⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\210107218.dll, ServiceMain2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2000
-