Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe
-
Size
95KB
-
MD5
450f676ed6ccd0d01de97923bc917a2a
-
SHA1
651b6cf038f8a46f80c95413b9695acfa17634d7
-
SHA256
1c1d4c1d2d2dd7440ee5ada0500d70e1d9573b7c5f3f0497555d656681d58499
-
SHA512
10dd11e8a54677fc424b230d36b0bca82f82157a5cdd6a99062ffdeae8448cd68daab87523e992bf9a3b41cbef6da3bf328e963f886e30d54393fc7506b8d142
-
SSDEEP
1536:b+YnODFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prC1rmZ44Cqrz:bs9S4jHS8q/3nTzePCwNUh4E9crMgqX
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000d000000023c22-15.dat family_gh0strat behavioral2/memory/1236-17-0x0000000000400000-0x000000000044C615-memory.dmp family_gh0strat behavioral2/memory/2872-20-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/4372-25-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/1916-30-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 1236 mquthjmroc -
Executes dropped EXE 1 IoCs
pid Process 1236 mquthjmroc -
Loads dropped DLL 3 IoCs
pid Process 2872 svchost.exe 4372 svchost.exe 1916 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\udhlvbhutm svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\ulufeekshh svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\udhlvbhutm svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 5080 2872 WerFault.exe 92 4992 4372 WerFault.exe 97 4756 1916 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mquthjmroc Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 mquthjmroc 1236 mquthjmroc -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 1236 mquthjmroc Token: SeBackupPrivilege 1236 mquthjmroc Token: SeBackupPrivilege 1236 mquthjmroc Token: SeRestorePrivilege 1236 mquthjmroc Token: SeBackupPrivilege 2872 svchost.exe Token: SeRestorePrivilege 2872 svchost.exe Token: SeBackupPrivilege 2872 svchost.exe Token: SeBackupPrivilege 2872 svchost.exe Token: SeSecurityPrivilege 2872 svchost.exe Token: SeSecurityPrivilege 2872 svchost.exe Token: SeBackupPrivilege 2872 svchost.exe Token: SeBackupPrivilege 2872 svchost.exe Token: SeSecurityPrivilege 2872 svchost.exe Token: SeBackupPrivilege 2872 svchost.exe Token: SeBackupPrivilege 2872 svchost.exe Token: SeSecurityPrivilege 2872 svchost.exe Token: SeBackupPrivilege 2872 svchost.exe Token: SeRestorePrivilege 2872 svchost.exe Token: SeBackupPrivilege 4372 svchost.exe Token: SeRestorePrivilege 4372 svchost.exe Token: SeBackupPrivilege 4372 svchost.exe Token: SeBackupPrivilege 4372 svchost.exe Token: SeSecurityPrivilege 4372 svchost.exe Token: SeSecurityPrivilege 4372 svchost.exe Token: SeBackupPrivilege 4372 svchost.exe Token: SeBackupPrivilege 4372 svchost.exe Token: SeSecurityPrivilege 4372 svchost.exe Token: SeBackupPrivilege 4372 svchost.exe Token: SeBackupPrivilege 4372 svchost.exe Token: SeSecurityPrivilege 4372 svchost.exe Token: SeBackupPrivilege 4372 svchost.exe Token: SeRestorePrivilege 4372 svchost.exe Token: SeBackupPrivilege 1916 svchost.exe Token: SeRestorePrivilege 1916 svchost.exe Token: SeBackupPrivilege 1916 svchost.exe Token: SeBackupPrivilege 1916 svchost.exe Token: SeSecurityPrivilege 1916 svchost.exe Token: SeSecurityPrivilege 1916 svchost.exe Token: SeBackupPrivilege 1916 svchost.exe Token: SeBackupPrivilege 1916 svchost.exe Token: SeSecurityPrivilege 1916 svchost.exe Token: SeBackupPrivilege 1916 svchost.exe Token: SeBackupPrivilege 1916 svchost.exe Token: SeSecurityPrivilege 1916 svchost.exe Token: SeBackupPrivilege 1916 svchost.exe Token: SeRestorePrivilege 1916 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1236 1132 JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe 87 PID 1132 wrote to memory of 1236 1132 JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe 87 PID 1132 wrote to memory of 1236 1132 JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\users\admin\appdata\local\mquthjmroc"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_450f676ed6ccd0d01de97923bc917a2a.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_450f676ed6ccd0d01de97923bc917a2a.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 11122⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2872 -ip 28721⤵PID:3440
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 7442⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4372 -ip 43721⤵PID:3576
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 9402⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1916 -ip 19161⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD5eecfddf304d7be92ffe6ca76030040f8
SHA13c2ca16e0f109ea685de1c4a72ec6da1d1b4a9a0
SHA256300c56c731410f745a082e1ff9e455277ea5bac4395eb5436fe02eed94a38fc2
SHA51251b92a10524014a0378ac660bd44310ce737f762896d72bdaead8b92e11ebe88dd22a9d06bed9d36e85f7551b25defe39445642078d759edb5b86d42910cee25
-
Filesize
300B
MD5241e077354bd4fecebcb9eea3717fdeb
SHA191ab1a2243a528040cca05f9a80e53644abfed48
SHA256c4469da48db078c7ceda71e6404ecd8f9a93e8cdfd1f97c606ac1e0c2ef4b0fb
SHA512727b857f4a101761764387adc082efaab64758bf1e6df74a50f19021ce180e29391a3bc52b97349ea27512e4ec68f49f3599f59c11ffbd6208f7dd96780ea790
-
Filesize
24.1MB
MD588415bad754beaa76d75b605709391c2
SHA1b66393e7516b8b78892217756ffd6b7e7c5ae05b
SHA256e37ea8d8398dbc7ddebea9698d99694c9c2072aaf6d7c421f8b4b6512c4318ae
SHA512c9a305ff3f072fca994f2eb92df50cc64139c3af04c705be8d5e60ed423e5c6c10a507ca6259dcb64c6d5bece714ba0261a8b2093d14b6025bb4cd4ab2cff88c
-
Filesize
22.6MB
MD5644b98dda96415ed48454e51aa0021e8
SHA1ba3e22f4dabcb7f9473ece8c29710c79ac0f9d68
SHA256dd61190a4a0c5386f311b60a3d887b170b734c689294439bbd2abc505a58c062
SHA512a25d025c86374fb34a664483f29cdc61d828762ee592c1393aa95a9ebcf1bbfabefda22894b60f923ee77ed443d4d6d9c406902b9c563f1651b6724d2ecea658