Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 04:08
Behavioral task
behavioral1
Sample
JaffaCakes118_4b0764166185753a0aca1663da221db0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4b0764166185753a0aca1663da221db0.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4b0764166185753a0aca1663da221db0.exe
-
Size
116KB
-
MD5
4b0764166185753a0aca1663da221db0
-
SHA1
7739a9d8b2ff89df74d9938ad6e1f85743deca5e
-
SHA256
3a0ca4768db5f534506585983f0deab409842756806479e976a06590a3766466
-
SHA512
ececcebf3a96d69019c2b858a20be5cd483a887246f143c331c8d2b92b22113c10f29ccfda77d1d81a63373d6377bde229e280c3374136856bca77d54059e108
-
SSDEEP
3072:mIKicaxDGSoIFrICPGcmeOLMii7s5otn8+tmlfnsinKbznbDD:mXHa0IFrIVcmeOg85UtUfsjznD
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/2700-0-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral2/files/0x000a000000023bc4-2.dat family_gh0strat behavioral2/memory/2700-3-0x0000000000400000-0x000000000041E000-memory.dmp family_gh0strat behavioral2/memory/2976-5-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat behavioral2/memory/2976-6-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\360svc\Parameters\ServiceDll = "C:\\WINDOWS\\system32\\dllcache\\ntser.dll" JaffaCakes118_4b0764166185753a0aca1663da221db0.exe -
Deletes itself 1 IoCs
pid Process 2976 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2976 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\dllcache JaffaCakes118_4b0764166185753a0aca1663da221db0.exe File created C:\WINDOWS\SysWOW64\dllcache\ntser.dll JaffaCakes118_4b0764166185753a0aca1663da221db0.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4b0764166185753a0aca1663da221db0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b0764166185753a0aca1663da221db0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b0764166185753a0aca1663da221db0.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2700
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD570b633288759bf70dd19f161e9285801
SHA1f9bf42cd22014a629bba1fa54c42476edf861b64
SHA2566d37b7774769bc0d339f2acd85d4df240ad5e904df5d63b14b5c54fb64354f3e
SHA51277694d4f0765d45063303a32a1d0f3da66459c49ce1df7a6345b5d58d29f4711845ed13454a0ca10dd492ea28839299cb76ac7721d5fe4dcd3a87a8ead3f8369