Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 08:08
Behavioral task
behavioral1
Sample
JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe
-
Size
196KB
-
MD5
4c2909912dac739d2cce790dacb9cdd5
-
SHA1
856b864ca31a9de4c749e58befcc80dd8bebfa4f
-
SHA256
cd2b8399b2a84f9f59197665777c9c8931870e4cc9fecc84ca905d7f05572fa5
-
SHA512
4fe68e49710b9ac37d92f9239bc76f8c0eef368fa2b4a4faa02f9e7eb96c15f56ed70734858e84bc85e00833e9e8761ecbf15d0416ccb2818bf3b8637984b03f
-
SSDEEP
3072:1a5gMYN37IHH1kdkOefmuvvpONDIK3I21qugTh4aPGS:fMYNMHwkNf7vU+K4gqugTOaPGS
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/436-12-0x0000000000400000-0x0000000000432000-memory.dmp family_gh0strat -
Gh0strat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe -
Executes dropped EXE 1 IoCs
pid Process 4652 QQGameDl.exe -
Loads dropped DLL 1 IoCs
pid Process 4652 QQGameDl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\systen = "C:\\Program Files\\Common Files\\Sogou.exe" QQGameDl.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Sogou.exe JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QQGameDl.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 436 JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 436 wrote to memory of 4652 436 JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe 93 PID 436 wrote to memory of 4652 436 JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe 93 PID 436 wrote to memory of 4652 436 JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4c2909912dac739d2cce790dacb9cdd5.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:436 -
C:\QQGameDl.exe"C:\QQGameDl.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD500b563630caf0c52763ba2ef96e72f1e
SHA19c1827fe7c0d47a1d12197a27e7f2d3303175fe0
SHA256e9fbd3cc6eea2d0423cefdf3f073fb7014a1e0a568faba90a7282565033b9af5
SHA5122a215ec1e552c9269f126c92da64bb95d564d66ac9a58d6170eee1747da97b9d575321a090a990c436608b6265deecce4484dc0b253729c5adf263a31f65d6b6
-
Filesize
14KB
MD5283dfc61285de508d6e40c3d83d686b7
SHA1a2169603ff6ffd1abdc3fa62c2f5d1d8bc21d92f
SHA256048aa0309250dd9c5f32b2dfa1828318502f0d138c684340e33196caef7bd2b9
SHA512c265621e03bf20363dc98ace6c147db5c3e6300011290b99de6218d386496c5fcc653b5fc7d6e8fae8cf7d489510090d63c70f8fabe0ce496d894f954ae330f1