Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2025, 07:02

General

  • Target

    JaffaCakes118_4be029b09b8e3fe3abccfaa224c41ec6.exe

  • Size

    10.2MB

  • MD5

    4be029b09b8e3fe3abccfaa224c41ec6

  • SHA1

    e0ce1cbf170ad06367e1f1481755be06c578bfc6

  • SHA256

    3a9a6d4bbfbc7bd43f8e9b9962c06a3fe851b06d95cf4d9830e4febe8211e42a

  • SHA512

    3a80c7b791bdc66c39041b5dcc686f47a58051ab1a429b0cfd3d864816a59d98442585ab450002ef9b859d9b5d01f74ec3c0c2cb6579762af975d54d0bff1167

  • SSDEEP

    3072:SQhOv9nd/M9Wzh0kHbPzYrIy97rsQUt06M8VqWtDG8vdbOeZCNVowgnCJ2BsJln:SQYv9nO9SXHbP0sy9kF07iRvdbvIUChn

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4be029b09b8e3fe3abccfaa224c41ec6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4be029b09b8e3fe3abccfaa224c41ec6.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\system
      C:\system C:\PROGRA~1\Realtek\EDITOR~1.DLL hime
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2484
    • C:\system
      C:\system C:\PROGRA~1\WIFE7F~1\CONTRO~1.CPL comdl2
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2488
    • C:\system
      C:\system C:\PROGRA~1\Realtek\EDITOR~1.DLL comdl2
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2828
  • C:\Windows\System32\svchost.exe
    C:\Windows\\System32\\svchost.exe -k netsvcs
    1⤵
      PID:3016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~1\WIFE7F~1\CONTRO~1.CPL

      Filesize

      30.1MB

      MD5

      37d9791df2ba01c58479658d00087788

      SHA1

      c99fcade315f7b2319e64155e0bea94d2001620e

      SHA256

      71a2b0f57beacaf48f4813e3ac243f98fbb3e0149245bcd3bf3d65b80427ef1f

      SHA512

      5e34fac3e3c95aa44e10c577a67b626c7c610433505040cedccb935e9feb6c007556d61b204ef9e1678312b5f520a974b40af8dfeea090ae0e4fb1a42b411530

    • C:\Windows\SysWOW64\bak8011252.log

      Filesize

      84B

      MD5

      8dd11cc6d674c054f444456841febd7c

      SHA1

      e9adbfd45044f03034ba51e531e2d4f3581e3f0a

      SHA256

      5a9842ceec957fe8aaaf7b93233b1fe42fe3ff11b3690171af9b1d1f8d5c65aa

      SHA512

      ea8ee1d34d5f62554826632217b2c63bad135491e8e7054cb4c78de9023ca3d2a44fc305ea7770249bba711d29228c9bacffd5fbe1df0eb6ce50bc0bff7d5675

    • C:\system

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • memory/2508-0-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/2508-28-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB