Analysis

  • max time kernel
    125s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 21:40

General

  • Target

    JaffaCakes118_4fb88fbffa77c64f0de9334c63f3822b.exe

  • Size

    192KB

  • MD5

    4fb88fbffa77c64f0de9334c63f3822b

  • SHA1

    5a3c434345cb977442ad6588264632cdba641d66

  • SHA256

    53cdf65992d6d9746d57864e4ae91eff03700c493607948f63e4687dc9a2c54d

  • SHA512

    abf05a6bbfd2b28c297519ce4e50873797f7ccec02aca6c77f108387e0eb3d6d50e5c6f4203735c8097b1a4c6bc4c848307c40c88d0a2288ee373d29aa7b8596

  • SSDEEP

    3072:5B1PFJunGnFQFT4zFcnH/+RHMX3UHA/Jrz4fgKcVKG7NDJAA0hVj1ZU5yJ:JPFJunGnOFT4mSsWqHF7QAM1q5g

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fb88fbffa77c64f0de9334c63f3822b.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fb88fbffa77c64f0de9334c63f3822b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3620
    • \??\c:\users\admin\appdata\local\joocwb
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fb88fbffa77c64f0de9334c63f3822b.exe"a -s
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:3348
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "netsvcs" -s fastuserswitchingcompatibility
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\joocwb

    Filesize

    192KB

    MD5

    b2a6c538275569fa79920e399cacc92d

    SHA1

    a232ef5239d27416b9f3b582ca461cc7bde8bba4

    SHA256

    95a97018e1db81877de3fb971058e702039acacdafe26e3ade92d50acc85e4b7

    SHA512

    452fbf8f57d23a7230b20380dd6aa9e74de3743e3037b366635e1ede7971024ee6c5bb1fc4d8d515947e91448f14a8afba0d022ca37adf006ba5a8dbd0213c4b

  • \??\c:\progra~2\stormii\fpmsq.biz

    Filesize

    1.4MB

    MD5

    1f8fc5ceb6e798cfea30c0e12ed00683

    SHA1

    4938531674c34e24ade79b85047f222f67cc12e2

    SHA256

    97f5044b25e1982920df499042627b9ab5572a4cf406854dc0226f993f87db7c

    SHA512

    39ec33444bcea82ca01e991e5e412ab7f5493ad8b4f10427584dd6e7f1d3dd8d7826926c15d622aa81875e6dfac0442b366af4f68cc0d41bd7fd321ee04fe9e4

  • memory/3620-4-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB