Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe
-
Size
304KB
-
MD5
481ca73b9c971aafc0d01fd55ce6400c
-
SHA1
9d86a850c576d082a82c75620cce0bdeed470169
-
SHA256
d6818b84aab8f4699b1ec9b09836806f47d58d42dacb2b81a7d57aa962c63de4
-
SHA512
2d94ffc3d6eaa3cfc9c246c99ff2c370cb495ffc5f0237cab1cda1055aa3a78bf774a99212482c4157b0160e7b47fcb2938e28b6950ce7e970730e582d34438f
-
SSDEEP
6144:i4f3OBkOFO8PRg2pqi+0rgoWUHSpW2qUzirTcxgTWZ4ka7+4J:i4feBJRrqi+w/H12BirTygJ3HJ
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2388-19-0x00000000004E0000-0x000000000051B000-memory.dmp family_gh0strat behavioral1/files/0x0009000000016b17-17.dat family_gh0strat behavioral1/memory/2748-31-0x0000000000400000-0x000000000043B000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 2 IoCs
pid Process 1788 259424967.exe 2748 259426152.exe -
Loads dropped DLL 4 IoCs
pid Process 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\WINDOWS\\Ball.exe" 259426152.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\Ball.exe 259426152.exe File opened for modification C:\WINDOWS\Ball.exe 259426152.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 259424967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 259426152.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2748 259426152.exe 2748 259426152.exe 2748 259426152.exe 2748 259426152.exe 2748 259426152.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2748 259426152.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1788 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 30 PID 2388 wrote to memory of 1788 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 30 PID 2388 wrote to memory of 1788 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 30 PID 2388 wrote to memory of 1788 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 30 PID 1788 wrote to memory of 2792 1788 259424967.exe 31 PID 1788 wrote to memory of 2792 1788 259424967.exe 31 PID 1788 wrote to memory of 2792 1788 259424967.exe 31 PID 1788 wrote to memory of 2792 1788 259424967.exe 31 PID 2388 wrote to memory of 2748 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 33 PID 2388 wrote to memory of 2748 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 33 PID 2388 wrote to memory of 2748 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 33 PID 2388 wrote to memory of 2748 2388 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\259424967.exeC:\Users\Admin\AppData\Local\Temp\\259424967.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\259424967.exe3⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
C:\Users\Admin\AppData\Local\Temp\259426152.exe"C:\Users\Admin\AppData\Local\Temp\259426152.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD52d1f300d4557117a736a4fe7118d39cf
SHA18632c0030646cdff9b3080d69860609e7129fab9
SHA2568a204beab5048f1fd4ab730bf8f4b12500d3e1aa0cd15c1cb42915125e787215
SHA512f3c6e616a54180f697b36d46ad1c513c1198139b2112b7bf6f851cb4585b4fbf4b5b2331954a09cb274323c77c7cd29693377d0f0402b1a0561e3416aa433a0e