Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 07:05

General

  • Target

    JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe

  • Size

    201KB

  • MD5

    45945f6d9c8edd729b93aeffa3d1fc27

  • SHA1

    90dceee6c34577e711189b732fce9ce54d9cdd58

  • SHA256

    f3295b9f27c544f155bd8f881b25372ed6c6d03ed4790bd3f5174ad44ae7c246

  • SHA512

    896674c57e1d9552d46323e0746410c8c5b97ef00e5044652e0ac29048d4bbcbea2b140ae2fb4bd219e29ef1b28f2379e24c18ea7f59d66bc8033d42beaa6334

  • SSDEEP

    6144:xs4C6nW8QABTyFZqyhYPbFcTBlhHr6ndnkM0Nd:OQW88jq8YPbFcT3ySd

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4252
    • \??\c:\users\admin\appdata\local\boqfqlyktk
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_45945f6d9c8edd729b93aeffa3d1fc27.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:6064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 6064 -s 320
        3⤵
        • Program crash
        PID:540
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 6064 -s 512
        3⤵
        • Program crash
        PID:2204
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 6064 -ip 6064
    1⤵
      PID:1084
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1200
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 872
        2⤵
        • Program crash
        PID:4540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6064 -ip 6064
      1⤵
        PID:2356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1200 -ip 1200
        1⤵
          PID:4240
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
          1⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4376
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1104
            2⤵
            • Program crash
            PID:3376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4376 -ip 4376
          1⤵
            PID:3156
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
            1⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3456
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 884
              2⤵
              • Program crash
              PID:3992
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3456 -ip 3456
            1⤵
              PID:5236

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\boqfqlyktk

              Filesize

              21.3MB

              MD5

              a9e5151c0ace4bdc6b27a2e13a9fc999

              SHA1

              fafd900ae4c2401a60d2f40c6b4a671c22bd9bb7

              SHA256

              bf2ea62a6b8a0b78d299ff63a22466227225457ed4a9e2380784da79df8b0fac

              SHA512

              6b57d74ca9d4b05919fabe3cec052ce8cc872a0f43b6f6726bfed6b3e714fe851fd1b657c35fd3e84528a8e65f9e10410c3674be903b0f9d57b2526937ac8302

            • C:\Windows\SysWOW64\svchost.exe.txt

              Filesize

              198B

              MD5

              492f38a739cab58f6e7f98d87a9c9db9

              SHA1

              0a2b64d5fd4fca6fc9d6c1ab599d68ea06658b2c

              SHA256

              fe22c404f77b5f8ad7b4dabdd64e60260ed44ead99dcad28f56c7830536c50c6

              SHA512

              759bf2870a8799772d1165ed558994c997fc71d12304e1919ad6f7373f3def7d263db748b3095cf81e8c476e08e8badacb54aa4babce3a7362f46cc4bc57e558

            • C:\Windows\SysWOW64\svchost.exe.txt

              Filesize

              297B

              MD5

              dad8aa0582c785baaaea54435d6a245c

              SHA1

              ec585397c839158b04e3547622662528cd4c2731

              SHA256

              ca8e8106f690dead1e038534622aa34896cc89bb13cf5d13a202815106504787

              SHA512

              2b73dfebc90ebc9b269e1e87d81d12138608d7ef8d2763cb54efacbfe0a53be692c547970978702aa2eb68425a68134a79e698e698498ab9c1bf81e7c912f832

            • \??\c:\programdata\drm\%sessionname%\tdrfu.cc3

              Filesize

              20.0MB

              MD5

              360902e29c24a09b63f2ce574665d785

              SHA1

              4051a2c462878227b0943e05b0677c4e680c7f8a

              SHA256

              01ffdf67ceadb5d2f9c00f22c4064bc8ab5e671f9aa11471860e1a6bbe28d1d5

              SHA512

              8c902371f256583b4abc24227b276967a39011f993a52c252ff5514c38ea7ca92a97b688304e41ebead3e3ea7419c3f44fba9a3071590b401dca3f6f1a398602

            • memory/1200-9-0x0000000001D10000-0x0000000001D11000-memory.dmp

              Filesize

              4KB

            • memory/1200-11-0x0000000020000000-0x0000000020027000-memory.dmp

              Filesize

              156KB

            • memory/3456-18-0x0000000001D80000-0x0000000001D81000-memory.dmp

              Filesize

              4KB

            • memory/3456-21-0x0000000020000000-0x0000000020027000-memory.dmp

              Filesize

              156KB

            • memory/4376-13-0x0000000000E40000-0x0000000000E41000-memory.dmp

              Filesize

              4KB

            • memory/4376-16-0x0000000020000000-0x0000000020027000-memory.dmp

              Filesize

              156KB