Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 02:45
Behavioral task
behavioral1
Sample
JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe
-
Size
139KB
-
MD5
4434ca379eb7b1fdc02940ef15d52d04
-
SHA1
6ed397dfb56665f1ffb9638086f23a9b1fc0d8cf
-
SHA256
85a6e4bb095b6ea38c8d07d62e348d5c5515a0f2bd6593c54c83610bf264fddf
-
SHA512
99f308139dc1b3588363ae938d89e84fc13921ac2505f3b2b6e1558c050d759be1b16fac9db1df88ae2853ce53eeb8c7bc77567d70f5f0faefec6480f96da9bb
-
SSDEEP
3072:o7WLeYPiFfs8qr+Nw7h+Feu4g8qbACPAKJrV3MIAo47u:o1s8qVTohAM1laIpc
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000b000000016d1c-5.dat family_gh0strat behavioral1/files/0x000900000001227e-11.dat family_gh0strat behavioral1/memory/1176-12-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2976 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Xtuv\Dtuvwxyab.jpg JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe File created C:\Program Files (x86)\Xtuv\Dtuvwxyab.jpg JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe 2976 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1176 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeRestorePrivilege 1176 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeBackupPrivilege 1176 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeRestorePrivilege 1176 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeBackupPrivilege 1176 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeRestorePrivilege 1176 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeBackupPrivilege 1176 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeRestorePrivilege 1176 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD50abf5a00d6a1091374b1b60e08131c24
SHA10389bbf2206e46a1b98e05ae623bf9519e982f0f
SHA256df1c3408c34ca1a15d89afc6259dd52c899fe378d54485a729b804b385848f94
SHA5120df04bf23e01d103dfa28bd5ec8b373ac55bffa4929cc974f32110529cac79592655c7acff574d8e7704a4cfc929fc97d56e63215f24ed1afb8b8194a1df6ff8
-
Filesize
216KB
MD5d31552bd64b4e4740fcd44b7595f28ad
SHA1969ac241cde17d19fae68fe8a1894e82fbe10020
SHA25600e18c91b356cf9653f6e089c18f2a3ba5db8fa800126cafd74f8db6f23a8c76
SHA5120db5690043053bec8008b0fe466d12d325ff1580f69e68a7c5ee4931557d41242ca0ea492fc4b9aa8bc69591f8688bf118031760feb2ee13a9df3d0ed086bacf
-
Filesize
98B
MD58c15655b87bcb65776e6c62c8b2cf4fe
SHA12ca5fdc9da262742af14fdacb9a55c5560094e52
SHA256dadfd465a700fd848fb3e4ed071ea7b243cff6eea0c59bcf89f83eae28d6a63d
SHA512ebe6da2954e1f232504f2e17fb821b4c89cd91d5671a6fe9771ab8628b0ae103591240f8a32fae7357db9348b6e887813db1663fc6fac4d392a16c0c62634f05