Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe
-
Size
127KB
-
MD5
4a20152d896cd56f5d912cee998f8162
-
SHA1
d9004aeecd5afa4231e68924f6fa71790c29fc42
-
SHA256
51a45e8849b249b67047968e806ae287d07989060631e3af37cf25499bc14a13
-
SHA512
f80eca9b601f2321dd3f14c788191fc7f6d4212c1a76e0d5b79f0ad3e5a782613983a4471eaf6f7bdaf83c6953110273b34a897a264373e95b3ae4e9efee0a23
-
SSDEEP
3072:vgTWBeYD+EvhZ3W77mZWJt5hiGF2NoEC62:Y6eYD+EZZG7CZ6FaC
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/2160-7-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/2160-6-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/2160-5-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat behavioral2/memory/2160-3-0x0000000010000000-0x0000000010046000-memory.dmp family_gh0strat -
Gh0strat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\980B7DB7 = "C:\\Windows\\980B7DB7\\svchsot.exe" JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\980B7DB7\svchsot.exe JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe File created C:\Windows\980B7DB7\svchsot.exe JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 4752 net.exe 1644 net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe Token: SeDebugPrivilege 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4752 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 89 PID 2160 wrote to memory of 4752 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 89 PID 2160 wrote to memory of 4752 2160 JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe 89 PID 4752 wrote to memory of 1644 4752 net.exe 91 PID 4752 wrote to memory of 1644 4752 net.exe 91 PID 4752 wrote to memory of 1644 4752 net.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a20152d896cd56f5d912cee998f8162.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:1644
-
-