Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 07:05
Behavioral task
behavioral1
Sample
JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe
-
Size
201KB
-
MD5
45945f6d9c8edd729b93aeffa3d1fc27
-
SHA1
90dceee6c34577e711189b732fce9ce54d9cdd58
-
SHA256
f3295b9f27c544f155bd8f881b25372ed6c6d03ed4790bd3f5174ad44ae7c246
-
SHA512
896674c57e1d9552d46323e0746410c8c5b97ef00e5044652e0ac29048d4bbcbea2b140ae2fb4bd219e29ef1b28f2379e24c18ea7f59d66bc8033d42beaa6334
-
SSDEEP
6144:xs4C6nW8QABTyFZqyhYPbFcTBlhHr6ndnkM0Nd:OQW88jq8YPbFcT3ySd
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x000700000001e6c0-3.dat family_gh0strat behavioral2/files/0x000f000000023c04-7.dat family_gh0strat behavioral2/memory/1200-11-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/4376-16-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/3456-21-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 6064 boqfqlyktk -
Executes dropped EXE 1 IoCs
pid Process 6064 boqfqlyktk -
Loads dropped DLL 3 IoCs
pid Process 1200 svchost.exe 4376 svchost.exe 3456 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\jgyoqasdqt svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\jgyoqasdqt svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\jxkviwqfdy svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 540 6064 WerFault.exe 89 2204 6064 WerFault.exe 89 4540 1200 WerFault.exe 97 3376 4376 WerFault.exe 103 3992 3456 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language boqfqlyktk Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6064 boqfqlyktk 6064 boqfqlyktk -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 6064 boqfqlyktk Token: SeBackupPrivilege 6064 boqfqlyktk Token: SeBackupPrivilege 6064 boqfqlyktk Token: SeRestorePrivilege 6064 boqfqlyktk Token: SeBackupPrivilege 1200 svchost.exe Token: SeRestorePrivilege 1200 svchost.exe Token: SeBackupPrivilege 1200 svchost.exe Token: SeBackupPrivilege 1200 svchost.exe Token: SeSecurityPrivilege 1200 svchost.exe Token: SeSecurityPrivilege 1200 svchost.exe Token: SeBackupPrivilege 1200 svchost.exe Token: SeBackupPrivilege 1200 svchost.exe Token: SeSecurityPrivilege 1200 svchost.exe Token: SeBackupPrivilege 1200 svchost.exe Token: SeBackupPrivilege 1200 svchost.exe Token: SeSecurityPrivilege 1200 svchost.exe Token: SeBackupPrivilege 1200 svchost.exe Token: SeRestorePrivilege 1200 svchost.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeRestorePrivilege 4376 svchost.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeSecurityPrivilege 4376 svchost.exe Token: SeSecurityPrivilege 4376 svchost.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeSecurityPrivilege 4376 svchost.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeSecurityPrivilege 4376 svchost.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeRestorePrivilege 4376 svchost.exe Token: SeBackupPrivilege 3456 svchost.exe Token: SeRestorePrivilege 3456 svchost.exe Token: SeBackupPrivilege 3456 svchost.exe Token: SeBackupPrivilege 3456 svchost.exe Token: SeSecurityPrivilege 3456 svchost.exe Token: SeSecurityPrivilege 3456 svchost.exe Token: SeBackupPrivilege 3456 svchost.exe Token: SeBackupPrivilege 3456 svchost.exe Token: SeSecurityPrivilege 3456 svchost.exe Token: SeBackupPrivilege 3456 svchost.exe Token: SeBackupPrivilege 3456 svchost.exe Token: SeSecurityPrivilege 3456 svchost.exe Token: SeBackupPrivilege 3456 svchost.exe Token: SeRestorePrivilege 3456 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4252 wrote to memory of 6064 4252 JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe 89 PID 4252 wrote to memory of 6064 4252 JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe 89 PID 4252 wrote to memory of 6064 4252 JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\users\admin\appdata\local\boqfqlyktk"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6064 -s 3203⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6064 -s 5123⤵
- Program crash
PID:2204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 6064 -ip 60641⤵PID:1084
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 8722⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6064 -ip 60641⤵PID:2356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1200 -ip 12001⤵PID:4240
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 11042⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4376 -ip 43761⤵PID:3156
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 8842⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3456 -ip 34561⤵PID:5236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.3MB
MD5a9e5151c0ace4bdc6b27a2e13a9fc999
SHA1fafd900ae4c2401a60d2f40c6b4a671c22bd9bb7
SHA256bf2ea62a6b8a0b78d299ff63a22466227225457ed4a9e2380784da79df8b0fac
SHA5126b57d74ca9d4b05919fabe3cec052ce8cc872a0f43b6f6726bfed6b3e714fe851fd1b657c35fd3e84528a8e65f9e10410c3674be903b0f9d57b2526937ac8302
-
Filesize
198B
MD5492f38a739cab58f6e7f98d87a9c9db9
SHA10a2b64d5fd4fca6fc9d6c1ab599d68ea06658b2c
SHA256fe22c404f77b5f8ad7b4dabdd64e60260ed44ead99dcad28f56c7830536c50c6
SHA512759bf2870a8799772d1165ed558994c997fc71d12304e1919ad6f7373f3def7d263db748b3095cf81e8c476e08e8badacb54aa4babce3a7362f46cc4bc57e558
-
Filesize
297B
MD5dad8aa0582c785baaaea54435d6a245c
SHA1ec585397c839158b04e3547622662528cd4c2731
SHA256ca8e8106f690dead1e038534622aa34896cc89bb13cf5d13a202815106504787
SHA5122b73dfebc90ebc9b269e1e87d81d12138608d7ef8d2763cb54efacbfe0a53be692c547970978702aa2eb68425a68134a79e698e698498ab9c1bf81e7c912f832
-
Filesize
20.0MB
MD5360902e29c24a09b63f2ce574665d785
SHA14051a2c462878227b0943e05b0677c4e680c7f8a
SHA25601ffdf67ceadb5d2f9c00f22c4064bc8ab5e671f9aa11471860e1a6bbe28d1d5
SHA5128c902371f256583b4abc24227b276967a39011f993a52c252ff5514c38ea7ca92a97b688304e41ebead3e3ea7419c3f44fba9a3071590b401dca3f6f1a398602