Analysis
-
max time kernel
89s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 21:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_4934ec83f156126710abcda2ed68dc21.exe
Resource
win7-20240729-en
6 signatures
150 seconds
General
-
Target
JaffaCakes118_4934ec83f156126710abcda2ed68dc21.exe
-
Size
115KB
-
MD5
4934ec83f156126710abcda2ed68dc21
-
SHA1
aa905ca39f3205de42268bcba3af4e10528ab665
-
SHA256
05833ccb873cfdb21bbcb52a26d89c9de487ba866aa48efe030b1b37c6bedd28
-
SHA512
f218d9e62877e480ca005a3a5d8d39fb6e001118f9b72955e585656e30b15da29db0453d67ad6a841fedeca72855be690a5961e4bcdc2b65df926df2332d91ae
-
SSDEEP
3072:1AFWqU/tH5KNglyt3cn7IP0O5vyP7fykMrSjyDMU30:1AoqUt5KNG0OIPlSTjUSjzU30
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2668-2-0x0000000000400000-0x000000000043C000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4934ec83f156126710abcda2ed68dc21.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2668 JaffaCakes118_4934ec83f156126710abcda2ed68dc21.exe 2668 JaffaCakes118_4934ec83f156126710abcda2ed68dc21.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 JaffaCakes118_4934ec83f156126710abcda2ed68dc21.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4934ec83f156126710abcda2ed68dc21.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4934ec83f156126710abcda2ed68dc21.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2668