Analysis
-
max time kernel
140s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe
-
Size
127KB
-
MD5
4a20152d896cd56f5d912cee998f8162
-
SHA1
d9004aeecd5afa4231e68924f6fa71790c29fc42
-
SHA256
51a45e8849b249b67047968e806ae287d07989060631e3af37cf25499bc14a13
-
SHA512
f80eca9b601f2321dd3f14c788191fc7f6d4212c1a76e0d5b79f0ad3e5a782613983a4471eaf6f7bdaf83c6953110273b34a897a264373e95b3ae4e9efee0a23
-
SSDEEP
3072:vgTWBeYD+EvhZ3W77mZWJt5hiGF2NoEC62:Y6eYD+EZZG7CZ6FaC
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2508-3-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/2508-5-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral1/memory/2508-7-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Gh0strat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\980B7DB7 = "C:\\Windows\\980B7DB7\\svchsot.exe" JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\980B7DB7\svchsot.exe JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe File opened for modification C:\Windows\980B7DB7\svchsot.exe JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 2832 net1.exe 1416 net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe Token: SeDebugPrivilege 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1416 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 30 PID 2508 wrote to memory of 1416 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 30 PID 2508 wrote to memory of 1416 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 30 PID 2508 wrote to memory of 1416 2508 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 30 PID 1416 wrote to memory of 2832 1416 net.exe 32 PID 1416 wrote to memory of 2832 1416 net.exe 32 PID 1416 wrote to memory of 2832 1416 net.exe 32 PID 1416 wrote to memory of 2832 1416 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:2832
-
-