Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2025, 02:45

General

  • Target

    JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe

  • Size

    139KB

  • MD5

    4434ca379eb7b1fdc02940ef15d52d04

  • SHA1

    6ed397dfb56665f1ffb9638086f23a9b1fc0d8cf

  • SHA256

    85a6e4bb095b6ea38c8d07d62e348d5c5515a0f2bd6593c54c83610bf264fddf

  • SHA512

    99f308139dc1b3588363ae938d89e84fc13921ac2505f3b2b6e1558c050d759be1b16fac9db1df88ae2853ce53eeb8c7bc77567d70f5f0faefec6480f96da9bb

  • SSDEEP

    3072:o7WLeYPiFfs8qr+Nw7h+Feu4g8qbACPAKJrV3MIAo47u:o1s8qVTohAM1laIpc

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1176
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\584900.dll

    Filesize

    131KB

    MD5

    0abf5a00d6a1091374b1b60e08131c24

    SHA1

    0389bbf2206e46a1b98e05ae623bf9519e982f0f

    SHA256

    df1c3408c34ca1a15d89afc6259dd52c899fe378d54485a729b804b385848f94

    SHA512

    0df04bf23e01d103dfa28bd5ec8b373ac55bffa4929cc974f32110529cac79592655c7acff574d8e7704a4cfc929fc97d56e63215f24ed1afb8b8194a1df6ff8

  • C:\Program Files (x86)\Xtuv\Dtuvwxyab.jpg

    Filesize

    216KB

    MD5

    d31552bd64b4e4740fcd44b7595f28ad

    SHA1

    969ac241cde17d19fae68fe8a1894e82fbe10020

    SHA256

    00e18c91b356cf9653f6e089c18f2a3ba5db8fa800126cafd74f8db6f23a8c76

    SHA512

    0db5690043053bec8008b0fe466d12d325ff1580f69e68a7c5ee4931557d41242ca0ea492fc4b9aa8bc69591f8688bf118031760feb2ee13a9df3d0ed086bacf

  • \??\c:\NT_Path.jpg

    Filesize

    98B

    MD5

    8c15655b87bcb65776e6c62c8b2cf4fe

    SHA1

    2ca5fdc9da262742af14fdacb9a55c5560094e52

    SHA256

    dadfd465a700fd848fb3e4ed071ea7b243cff6eea0c59bcf89f83eae28d6a63d

    SHA512

    ebe6da2954e1f232504f2e17fb821b4c89cd91d5671a6fe9771ab8628b0ae103591240f8a32fae7357db9348b6e887813db1663fc6fac4d392a16c0c62634f05

  • memory/1176-12-0x0000000010000000-0x0000000010024000-memory.dmp

    Filesize

    144KB