Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 01:51
Behavioral task
behavioral1
Sample
JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe
-
Size
102KB
-
MD5
4a6c8e1b9934ed67668456add2c7ccf8
-
SHA1
50f7d254cc55ea1fdc2ea38854edfdee981d2447
-
SHA256
b1c3e85a8b782d8c886ce869defec3907d85e66dd8e25353b10b7186fa28712d
-
SHA512
60b6646a153dc3ac4aa87c9d431e13bd641a9866d5e1c1e1a8d99d579b85524c4ff92642eb270b56e3ba90f1234d8c068bd11ed0774f62b8e528b492763d0fab
-
SSDEEP
3072:kstV5pSyGq0sJAPnhXW8iXBPOWTYiBVSV0Iu:FppSyGx40G3XhPUiBVSV0/
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2632-0-0x0000000000400000-0x000000000041B000-memory.dmp family_gh0strat behavioral1/files/0x0007000000012119-4.dat family_gh0strat behavioral1/files/0x0008000000015d6e-6.dat family_gh0strat behavioral1/memory/2632-10-0x0000000000400000-0x000000000041B000-memory.dmp family_gh0strat -
Gh0strat family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys svchost.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilitye.dll" JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe -
Deletes itself 1 IoCs
pid Process 2676 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2632 JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe 2676 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilitye.dll JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 476 Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a6c8e1b9934ed67668456add2c7ccf8.exe"1⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2632
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Drops file in Drivers directory
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5107bfd0392c57e6c35dce2e4144a0365
SHA11bc1b1e04f6a44d8cbba80ff6c935bfccb6dd7e1
SHA256791e6d7dfcf6221f72d6977c09a36f1ff5d9822cc1319b77bc076fdce0b70da3
SHA512093375e116238fb29360f66fdf662dfed570fe828fda0f4820335612e4e05934b6a03d54ccafb65c81561b216cc0c19753d93d65d7c393d17f3de066e82a83b1
-
Filesize
90KB
MD546958d4d21c2aa97eac22de8a74506c0
SHA11210c19a25beb638690960ec14191b9f227c7492
SHA256d348c314c22987888b8d9c79699e1e06c1fb5e901edaf643fe03023622ec44b7
SHA512bb29f948f47a45e4e02c595be4739e2f126dec225512b06c4b752490cec8c77b862eb0dff97f5a47ac2b3efc00f97627546de759c0d9e5a08a638292febc379f