Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 02:45
Behavioral task
behavioral1
Sample
JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe
-
Size
139KB
-
MD5
4434ca379eb7b1fdc02940ef15d52d04
-
SHA1
6ed397dfb56665f1ffb9638086f23a9b1fc0d8cf
-
SHA256
85a6e4bb095b6ea38c8d07d62e348d5c5515a0f2bd6593c54c83610bf264fddf
-
SHA512
99f308139dc1b3588363ae938d89e84fc13921ac2505f3b2b6e1558c050d759be1b16fac9db1df88ae2853ce53eeb8c7bc77567d70f5f0faefec6480f96da9bb
-
SSDEEP
3072:o7WLeYPiFfs8qr+Nw7h+Feu4g8qbACPAKJrV3MIAo47u:o1s8qVTohAM1laIpc
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000c000000023bbe-2.dat family_gh0strat behavioral2/files/0x000600000001e721-11.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 4788 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe 4788 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Xtuv\Dtuvwxyab.jpg JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe File created C:\Program Files (x86)\Xtuv\Dtuvwxyab.jpg JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe 4788 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeRestorePrivilege 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeBackupPrivilege 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeRestorePrivilege 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeBackupPrivilege 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeRestorePrivilege 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeBackupPrivilege 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe Token: SeRestorePrivilege 704 JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4434ca379eb7b1fdc02940ef15d52d04.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:704
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
131KB
MD50abf5a00d6a1091374b1b60e08131c24
SHA10389bbf2206e46a1b98e05ae623bf9519e982f0f
SHA256df1c3408c34ca1a15d89afc6259dd52c899fe378d54485a729b804b385848f94
SHA5120df04bf23e01d103dfa28bd5ec8b373ac55bffa4929cc974f32110529cac79592655c7acff574d8e7704a4cfc929fc97d56e63215f24ed1afb8b8194a1df6ff8
-
Filesize
98B
MD54795886685bdaed34808a8b408e9e62c
SHA1aeb728180a9d064c6ca4750da5d053fd7a038149
SHA25689c613ae78c0482039426e3fb53571c17b15f7894095fe888ca2d818b308adee
SHA51298e0d1daf27340f71152559ed48aed7abe297cabed0755fce91b9196e7e21305e58740267a2f500bea04e68f86c9f3e0981c1cb419f81ecd7d73293b3671141f
-
Filesize
353KB
MD5ad7f9b68822fdf78751c248fe7030ef6
SHA16303f897bae5f8e22c1082815980c8b0a1878157
SHA25604f8defb8a2fe74fe046dc38713917e22336c827a54e048d16418d3f5b8bff51
SHA512161444945533f362d9f929e61a1cd625599d4f7690d85eac6cf83f15a39ec468d69383fef29da0f4f60a7e74c8028af1929084b45895d178dea8052771ff4816