Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe
-
Size
509KB
-
MD5
4755a376b9328bde7999a3ba754210e7
-
SHA1
c5ab707d945b74bc916e38066102d813984e15db
-
SHA256
297b918341f1557ac6299bcb659645d58b4ebbca594ec61867272f93d45cf0a5
-
SHA512
d7f46bec2b6cfe103e9981577c992f60a1834fc99098478a4d5f11007d30b829d6acd6bac7540fd71c6164babee51c45f0166ac8e7eb00f55a2ebc9e8dbc60a7
-
SSDEEP
6144:CwQvXoim363/OG58dyQIpXBeKvcKviyg/P:7z6le0plvBvij/P
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3080-3-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral2/memory/3080-2-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral2/memory/3080-8-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral2/memory/3080-5-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat -
Gh0strat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX579E5A5B VVVVVVrr2unw== = "C:\\Windows\\XXXXXX579E5A5B VVVVVVrr2unw==\\svchsot.exe" JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe File opened for modification C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe File created C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\JH.BAT JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1976 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 5968 net.exe 1448 net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4452 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 85 PID 3080 wrote to memory of 4452 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 85 PID 3080 wrote to memory of 4452 3080 JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe 85 PID 4452 wrote to memory of 4256 4452 cmd.exe 87 PID 4452 wrote to memory of 4256 4452 cmd.exe 87 PID 4452 wrote to memory of 4256 4452 cmd.exe 87 PID 4452 wrote to memory of 1976 4452 cmd.exe 88 PID 4452 wrote to memory of 1976 4452 cmd.exe 88 PID 4452 wrote to memory of 1976 4452 cmd.exe 88 PID 4452 wrote to memory of 5968 4452 cmd.exe 89 PID 4452 wrote to memory of 5968 4452 cmd.exe 89 PID 4452 wrote to memory of 5968 4452 cmd.exe 89 PID 5968 wrote to memory of 1448 5968 net.exe 90 PID 5968 wrote to memory of 1448 5968 net.exe 90 PID 5968 wrote to memory of 1448 5968 net.exe 90 PID 4452 wrote to memory of 3144 4452 cmd.exe 91 PID 4452 wrote to memory of 3144 4452 cmd.exe 91 PID 4452 wrote to memory of 3144 4452 cmd.exe 91 PID 4452 wrote to memory of 5744 4452 cmd.exe 92 PID 4452 wrote to memory of 5744 4452 cmd.exe 92 PID 4452 wrote to memory of 5744 4452 cmd.exe 92 PID 4452 wrote to memory of 4960 4452 cmd.exe 93 PID 4452 wrote to memory of 4960 4452 cmd.exe 93 PID 4452 wrote to memory of 4960 4452 cmd.exe 93 PID 4452 wrote to memory of 3280 4452 cmd.exe 94 PID 4452 wrote to memory of 3280 4452 cmd.exe 94 PID 4452 wrote to memory of 3280 4452 cmd.exe 94 PID 4452 wrote to memory of 3036 4452 cmd.exe 95 PID 4452 wrote to memory of 3036 4452 cmd.exe 95 PID 4452 wrote to memory of 3036 4452 cmd.exe 95 PID 4452 wrote to memory of 5924 4452 cmd.exe 96 PID 4452 wrote to memory of 5924 4452 cmd.exe 96 PID 4452 wrote to memory of 5924 4452 cmd.exe 96 PID 4452 wrote to memory of 2372 4452 cmd.exe 98 PID 4452 wrote to memory of 2372 4452 cmd.exe 98 PID 4452 wrote to memory of 2372 4452 cmd.exe 98 PID 4452 wrote to memory of 3776 4452 cmd.exe 99 PID 4452 wrote to memory of 3776 4452 cmd.exe 99 PID 4452 wrote to memory of 3776 4452 cmd.exe 99 PID 4452 wrote to memory of 3816 4452 cmd.exe 100 PID 4452 wrote to memory of 3816 4452 cmd.exe 100 PID 4452 wrote to memory of 3816 4452 cmd.exe 100 PID 4452 wrote to memory of 5444 4452 cmd.exe 101 PID 4452 wrote to memory of 5444 4452 cmd.exe 101 PID 4452 wrote to memory of 5444 4452 cmd.exe 101 PID 4452 wrote to memory of 5288 4452 cmd.exe 102 PID 4452 wrote to memory of 5288 4452 cmd.exe 102 PID 4452 wrote to memory of 5288 4452 cmd.exe 102 PID 4452 wrote to memory of 3644 4452 cmd.exe 103 PID 4452 wrote to memory of 3644 4452 cmd.exe 103 PID 4452 wrote to memory of 3644 4452 cmd.exe 103 PID 4452 wrote to memory of 5092 4452 cmd.exe 104 PID 4452 wrote to memory of 5092 4452 cmd.exe 104 PID 4452 wrote to memory of 5092 4452 cmd.exe 104 PID 4452 wrote to memory of 5972 4452 cmd.exe 105 PID 4452 wrote to memory of 5972 4452 cmd.exe 105 PID 4452 wrote to memory of 5972 4452 cmd.exe 105 PID 4452 wrote to memory of 2692 4452 cmd.exe 106 PID 4452 wrote to memory of 2692 4452 cmd.exe 106 PID 4452 wrote to memory of 2692 4452 cmd.exe 106 PID 4452 wrote to memory of 3896 4452 cmd.exe 107 PID 4452 wrote to memory of 3896 4452 cmd.exe 107 PID 4452 wrote to memory of 3896 4452 cmd.exe 107 PID 4452 wrote to memory of 2860 4452 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4755a376b9328bde7999a3ba754210e7.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\JH.BAT""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:5968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:1448
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3144
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5744
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4960
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3280
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5924
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5444
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5288
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3644
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5972
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:4244
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5260
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5360
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:6140
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:5908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d8d3a3c95e9e23157286b883310db430
SHA1df3540006561b11eba293cb19556cb21a5f1cab7
SHA256a6557c4d137e61f94df072ae9f05d890f418388745151263d3278f0020a49ba1
SHA512b5065a78947236960e6dc632443443570839c47ba6107e091efd4c84df7f21a93dff07d97fc892d69a58ccecb5c04b019e8adbc718f735b0d9821ee7b82d21bc