Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 00:23
Behavioral task
behavioral1
Sample
JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe
-
Size
172KB
-
MD5
4a0480c2cd66b35d130784407b2679b7
-
SHA1
b662a103a8cad015aac4921ff23bb8394f1b8eb0
-
SHA256
241137a176d7cf39e0d4a070daf03e181a6515b52d721fc76d6f32ab7ca04b6a
-
SHA512
6320ff5555e61b3216e2d9a73b83c4fcf0b89b2318aaefcbbd0a2fe4a979b036b4c069f0a7f9b9915ce2f5b1203c677cb5b6c262160b52c35530df630f85f794
-
SSDEEP
3072:EIXp6tgGloVFwz8BD0cjRTyVwdUEQAZnC69NJ09sTpwx:EDlQwz8BDpWwOTA1C6rTux
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000122ea-2.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2596 RUNDLL32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created \??\c:\Program Files\WINDOWSS.INI JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe File created C:\Program Files\temp0\QQ.exe JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe File opened for modification C:\Program Files\temp0\QQ.exe JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUNDLL32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 1748 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1748 taskkill.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1748 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 31 PID 2592 wrote to memory of 1748 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 31 PID 2592 wrote to memory of 1748 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 31 PID 2592 wrote to memory of 1748 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 31 PID 2592 wrote to memory of 2596 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 32 PID 2592 wrote to memory of 2596 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 32 PID 2592 wrote to memory of 2596 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 32 PID 2592 wrote to memory of 2596 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 32 PID 2592 wrote to memory of 2596 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 32 PID 2592 wrote to memory of 2596 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 32 PID 2592 wrote to memory of 2596 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 32 PID 2592 wrote to memory of 2792 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 35 PID 2592 wrote to memory of 2792 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 35 PID 2592 wrote to memory of 2792 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 35 PID 2592 wrote to memory of 2792 2592 JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a0480c2cd66b35d130784407b2679b7.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im KSafeTray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\RUNDLL32.exeRUNDLL32 "c:\Program Files\WINDOWSS.INI" main2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd /c afc9fe2f418b00a0.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ae9fd1df5bfd7ead20640a25b288457d
SHA1b7c03fbd803c9c719c5bcffac84b7ed0f27603ca
SHA256b46c401fc732deb2c1a4956663bb5e4723ec91892b556dc1b66646b9b4987bde
SHA512819eae4794cc1fec8bd55591a0c14cc28e38d5c364a7edb6c8ba4b1d18355b97b0682e575e1e66342cd435baa2e093ac45bb6cefd0c80e7f43b1e58762c51977
-
Filesize
10.3MB
MD55dc17fd8477216863ae2e150e46757fb
SHA19d3237cf55432678581b3a5dc8bc0df2e761fa33
SHA25676cb0b7b62fda039cbe67bc98c3fc6eb8526d3343594a417f67b44cdaef11636
SHA512abbafdb3f3187ac6efb462b3e3f9b5eeaf2823d8bdf5a510798f34147e9140d680e7200e846c4a7d8e4f184299be30525ea3032194346f6396be6a10de5d9c9d