Analysis
-
max time kernel
97s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe
-
Size
304KB
-
MD5
481ca73b9c971aafc0d01fd55ce6400c
-
SHA1
9d86a850c576d082a82c75620cce0bdeed470169
-
SHA256
d6818b84aab8f4699b1ec9b09836806f47d58d42dacb2b81a7d57aa962c63de4
-
SHA512
2d94ffc3d6eaa3cfc9c246c99ff2c370cb495ffc5f0237cab1cda1055aa3a78bf774a99212482c4157b0160e7b47fcb2938e28b6950ce7e970730e582d34438f
-
SSDEEP
6144:i4f3OBkOFO8PRg2pqi+0rgoWUHSpW2qUzirTcxgTWZ4ka7+4J:i4feBJRrqi+w/H12BirTygJ3HJ
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x0005000000022b32-14.dat family_gh0strat behavioral2/memory/1220-21-0x0000000000400000-0x000000000043B000-memory.dmp family_gh0strat behavioral2/memory/1220-23-0x0000000000400000-0x000000000043B000-memory.dmp family_gh0strat -
Gh0strat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe -
Executes dropped EXE 2 IoCs
pid Process 4044 240619156.exe 1220 240622578.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\WINDOWS\\Ball.exe" 240622578.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\Ball.exe 240622578.exe File opened for modification C:\WINDOWS\Ball.exe 240622578.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3432 1220 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240619156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240622578.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1220 240622578.exe 1220 240622578.exe 1220 240622578.exe 1220 240622578.exe 1220 240622578.exe 1220 240622578.exe 1220 240622578.exe 1220 240622578.exe 1220 240622578.exe 1220 240622578.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4044 4900 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 88 PID 4900 wrote to memory of 4044 4900 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 88 PID 4900 wrote to memory of 4044 4900 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 88 PID 4044 wrote to memory of 1744 4044 240619156.exe 91 PID 4044 wrote to memory of 1744 4044 240619156.exe 91 PID 4044 wrote to memory of 1744 4044 240619156.exe 91 PID 4900 wrote to memory of 1220 4900 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 93 PID 4900 wrote to memory of 1220 4900 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 93 PID 4900 wrote to memory of 1220 4900 JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481ca73b9c971aafc0d01fd55ce6400c.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\240619156.exeC:\Users\Admin\AppData\Local\Temp\\240619156.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\240619156.exe3⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
C:\Users\Admin\AppData\Local\Temp\240622578.exe"C:\Users\Admin\AppData\Local\Temp\240622578.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 4483⤵
- Program crash
PID:3432
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1220 -ip 12201⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD52d1f300d4557117a736a4fe7118d39cf
SHA18632c0030646cdff9b3080d69860609e7129fab9
SHA2568a204beab5048f1fd4ab730bf8f4b12500d3e1aa0cd15c1cb42915125e787215
SHA512f3c6e616a54180f697b36d46ad1c513c1198139b2112b7bf6f851cb4585b4fbf4b5b2331954a09cb274323c77c7cd29693377d0f0402b1a0561e3416aa433a0e