Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe
-
Size
126KB
-
MD5
49d3e62c23c065e2682c4cc073d6e4ef
-
SHA1
7d54ae1b6fbbeff6e5db1a7bafb72f9b56114b4a
-
SHA256
5a3cbb5b117a6af5a470f06677af7086fedf25c6b00826b83a7877de251d2fa7
-
SHA512
7c1741a6fd7407b8385b806185305c8ede4afcdd2eaa11f4381852c1c76e9e8405e2e0a9abba92e89f6f909af51214fb2aeff935f67a265dacf2ed8014ccebc7
-
SSDEEP
3072:uWjdua1hf1papv4/4ArMVUtqzzDXP9ehTcnmZ:bVD/4ArhAznlOG
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral2/memory/2580-15-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral2/memory/3744-18-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral2/memory/2580-21-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral2/memory/3744-23-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral2/memory/2580-28-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat behavioral2/memory/3744-29-0x0000000010000000-0x0000000010230000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\210107218\Parameters\ServiceDll = "C:\\Windows\\system32\\210107218.dll" JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe -
Loads dropped DLL 2 IoCs
pid Process 2580 svchost.exe 3744 rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\210107218.dll JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe File created C:\Windows\SysWOW64\210107218.dll JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1468 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe Token: SeDebugPrivilege 2580 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1616 1468 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe 88 PID 1468 wrote to memory of 1616 1468 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe 88 PID 1468 wrote to memory of 1616 1468 JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe 88 PID 2580 wrote to memory of 3744 2580 svchost.exe 89 PID 2580 wrote to memory of 3744 2580 svchost.exe 89 PID 2580 wrote to memory of 3744 2580 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_49d3e62c23c065e2682c4cc073d6e4ef.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k 2101072181⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\210107218.dll, ServiceMain2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3744
-