Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 00:08
Behavioral task
behavioral1
Sample
JaffaCakes118_436ecb658447c78ef8400aef2d3d4a2f.dll
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
JaffaCakes118_436ecb658447c78ef8400aef2d3d4a2f.dll
-
Size
152KB
-
MD5
436ecb658447c78ef8400aef2d3d4a2f
-
SHA1
3021945d0b8d53f3362577f8433c5a52397d05bc
-
SHA256
0fe492e31d14b13eb2846b41e59950fa52ca84d467f5ffa18827ae0070bd5b8c
-
SHA512
ba7cc83eaccae660fc7793828327242dcf157ae278620eef8a909cad8dc613ed11c0cb6e94feb06dc2c68a76f6e1e526216d98bc986feed44a1c1e2fda8221be
-
SSDEEP
3072:0BWHWVKhqPEzO/V1VrNYQkCA+HFSWvN3TBftxnob2:kWHg9DNYtEHhvN3TBlxnob
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1620-0-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2664 1620 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1620 2336 rundll32.exe 30 PID 2336 wrote to memory of 1620 2336 rundll32.exe 30 PID 2336 wrote to memory of 1620 2336 rundll32.exe 30 PID 2336 wrote to memory of 1620 2336 rundll32.exe 30 PID 2336 wrote to memory of 1620 2336 rundll32.exe 30 PID 2336 wrote to memory of 1620 2336 rundll32.exe 30 PID 2336 wrote to memory of 1620 2336 rundll32.exe 30 PID 1620 wrote to memory of 2664 1620 rundll32.exe 31 PID 1620 wrote to memory of 2664 1620 rundll32.exe 31 PID 1620 wrote to memory of 2664 1620 rundll32.exe 31 PID 1620 wrote to memory of 2664 1620 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_436ecb658447c78ef8400aef2d3d4a2f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_436ecb658447c78ef8400aef2d3d4a2f.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 2243⤵
- Program crash
PID:2664
-
-