Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 04:36
Behavioral task
behavioral1
Sample
JaffaCakes118_4b2d3ddfcf3505eeef4d1d433254c9b0.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_4b2d3ddfcf3505eeef4d1d433254c9b0.dll
-
Size
74KB
-
MD5
4b2d3ddfcf3505eeef4d1d433254c9b0
-
SHA1
0140245c13dec20f32ea1d3859f7d0d04bc364e1
-
SHA256
63dd9cd75bf4fa9e11dea88a6eb2da7c88b48ee330801e6fc0573ed1279aaa1a
-
SHA512
4479d54abf2b2433d2aa4eeed05fc5fb0750d4156a5e53e02dc497acc68258681e34351355f1274adb5a6b387d4379066e39639f83c1f8337632e15ebc94ee14
-
SSDEEP
1536:3K1nFxLmztp0iqFwr7P/OCdK80cDJbfPnSC5CpCF/p:61nFdmNqFwrjmCAcJrPnSoCQFR
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2780-1-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2780 2696 rundll32.exe 30 PID 2696 wrote to memory of 2780 2696 rundll32.exe 30 PID 2696 wrote to memory of 2780 2696 rundll32.exe 30 PID 2696 wrote to memory of 2780 2696 rundll32.exe 30 PID 2696 wrote to memory of 2780 2696 rundll32.exe 30 PID 2696 wrote to memory of 2780 2696 rundll32.exe 30 PID 2696 wrote to memory of 2780 2696 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b2d3ddfcf3505eeef4d1d433254c9b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b2d3ddfcf3505eeef4d1d433254c9b0.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2780
-