Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe
-
Size
150KB
-
MD5
4bfc13c1512f1a8668c9bd86024747d4
-
SHA1
d782af875d43802e9512ed0c90bde843854ed4de
-
SHA256
4128727c52e7bda7339d0c4d5362e087db4db6177222685a992e21ae4ef5871b
-
SHA512
96f454533721f7e53eb5389899dfb4be7977a65b634e767b5b1eaed4e46e3c9d95f4464cb7dd1c95e0e4af287aa3f619b4f5e411fd74976ba8f0b12716ef74bc
-
SSDEEP
3072:/VhUTNt0TSmLGkhjKXFvIGk6H0ydpZTr5iSTNL9cEVz3CiODcRwZI:dkt0TSZkhWVvI+UupZTr5iSVrLmc5
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2616-16-0x0000000000400000-0x0000000000430000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2872 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2616 indB490.tmp 1992 inlD396.tmp -
Loads dropped DLL 3 IoCs
pid Process 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 2992 cmd.exe 2992 cmd.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\loader.dll indB490.tmp File created C:\Program Files\Common Files\lanmao.dll indB490.tmp -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\f76d4a2.msi msiexec.exe File opened for modification C:\Windows\Installer\f76d49d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID6BF.tmp msiexec.exe File opened for modification C:\Windows\Installer\f76d4a0.ipi msiexec.exe File created C:\WINDOWS\vbcfg.ini indB490.tmp File created C:\Windows\Installer\f76d49d.msi msiexec.exe File created C:\Windows\Installer\f76d4a0.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlD396.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language indB490.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 2956 msiexec.exe 2956 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2808 msiexec.exe Token: SeIncreaseQuotaPrivilege 2808 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeSecurityPrivilege 2956 msiexec.exe Token: SeCreateTokenPrivilege 2808 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2808 msiexec.exe Token: SeLockMemoryPrivilege 2808 msiexec.exe Token: SeIncreaseQuotaPrivilege 2808 msiexec.exe Token: SeMachineAccountPrivilege 2808 msiexec.exe Token: SeTcbPrivilege 2808 msiexec.exe Token: SeSecurityPrivilege 2808 msiexec.exe Token: SeTakeOwnershipPrivilege 2808 msiexec.exe Token: SeLoadDriverPrivilege 2808 msiexec.exe Token: SeSystemProfilePrivilege 2808 msiexec.exe Token: SeSystemtimePrivilege 2808 msiexec.exe Token: SeProfSingleProcessPrivilege 2808 msiexec.exe Token: SeIncBasePriorityPrivilege 2808 msiexec.exe Token: SeCreatePagefilePrivilege 2808 msiexec.exe Token: SeCreatePermanentPrivilege 2808 msiexec.exe Token: SeBackupPrivilege 2808 msiexec.exe Token: SeRestorePrivilege 2808 msiexec.exe Token: SeShutdownPrivilege 2808 msiexec.exe Token: SeDebugPrivilege 2808 msiexec.exe Token: SeAuditPrivilege 2808 msiexec.exe Token: SeSystemEnvironmentPrivilege 2808 msiexec.exe Token: SeChangeNotifyPrivilege 2808 msiexec.exe Token: SeRemoteShutdownPrivilege 2808 msiexec.exe Token: SeUndockPrivilege 2808 msiexec.exe Token: SeSyncAgentPrivilege 2808 msiexec.exe Token: SeEnableDelegationPrivilege 2808 msiexec.exe Token: SeManageVolumePrivilege 2808 msiexec.exe Token: SeImpersonatePrivilege 2808 msiexec.exe Token: SeCreateGlobalPrivilege 2808 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeIncBasePriorityPrivilege 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe Token: SeTakeOwnershipPrivilege 2956 msiexec.exe Token: SeRestorePrivilege 2956 msiexec.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2616 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 30 PID 1712 wrote to memory of 2616 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 30 PID 1712 wrote to memory of 2616 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 30 PID 1712 wrote to memory of 2616 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 30 PID 1712 wrote to memory of 2616 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 30 PID 1712 wrote to memory of 2616 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 30 PID 1712 wrote to memory of 2616 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 30 PID 1712 wrote to memory of 2808 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 32 PID 1712 wrote to memory of 2808 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 32 PID 1712 wrote to memory of 2808 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 32 PID 1712 wrote to memory of 2808 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 32 PID 1712 wrote to memory of 2808 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 32 PID 1712 wrote to memory of 2808 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 32 PID 1712 wrote to memory of 2808 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 32 PID 1712 wrote to memory of 2992 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 34 PID 1712 wrote to memory of 2992 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 34 PID 1712 wrote to memory of 2992 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 34 PID 1712 wrote to memory of 2992 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 34 PID 1712 wrote to memory of 2720 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 35 PID 1712 wrote to memory of 2720 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 35 PID 1712 wrote to memory of 2720 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 35 PID 1712 wrote to memory of 2720 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 35 PID 1712 wrote to memory of 2872 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 38 PID 1712 wrote to memory of 2872 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 38 PID 1712 wrote to memory of 2872 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 38 PID 1712 wrote to memory of 2872 1712 JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe 38 PID 2720 wrote to memory of 2740 2720 cmd.exe 40 PID 2720 wrote to memory of 2740 2720 cmd.exe 40 PID 2720 wrote to memory of 2740 2720 cmd.exe 40 PID 2720 wrote to memory of 2740 2720 cmd.exe 40 PID 2992 wrote to memory of 1992 2992 cmd.exe 41 PID 2992 wrote to memory of 1992 2992 cmd.exe 41 PID 2992 wrote to memory of 1992 2992 cmd.exe 41 PID 2992 wrote to memory of 1992 2992 cmd.exe 41 PID 2956 wrote to memory of 752 2956 msiexec.exe 42 PID 2956 wrote to memory of 752 2956 msiexec.exe 42 PID 2956 wrote to memory of 752 2956 msiexec.exe 42 PID 2956 wrote to memory of 752 2956 msiexec.exe 42 PID 2956 wrote to memory of 752 2956 msiexec.exe 42 PID 2956 wrote to memory of 752 2956 msiexec.exe 42 PID 2956 wrote to memory of 752 2956 msiexec.exe 42 PID 1992 wrote to memory of 2936 1992 inlD396.tmp 44 PID 1992 wrote to memory of 2936 1992 inlD396.tmp 44 PID 1992 wrote to memory of 2936 1992 inlD396.tmp 44 PID 1992 wrote to memory of 2936 1992 inlD396.tmp 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4bfc13c1512f1a8668c9bd86024747d4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\indB490.tmpC:\Users\Admin\AppData\Local\Temp\indB490.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\INSD0C~1.INI /quiet2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\inlD396.tmpC:\Users\Admin\AppData\Local\Temp\inlD396.tmp cdf1912.tmp3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlD396.tmp > nul4⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D03C715E2789432E81318CFC5491180E2⤵
- System Location Discovery: System Language Discovery
PID:752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5c14267eeb78f64556647a7ea2cd22af9
SHA134380025a0c05586ed35f468689a73724b0abec9
SHA2566bc90b169f4b87a99ba03db93d63898f6a5b253a38f8a92c7da9dfccd4ef85b1
SHA512bc91c69eecffbf30ae95a8a9b7517a4abce404d0d1e1502bbc8bf6c3d7e5b3bc1ccb6c087386b84c5601fd8edaea0276cd1d6b243b9180b2e374d3f75db6db1a
-
Filesize
66KB
MD57aab5e03141b9fe896c43d8bb657f931
SHA17730007a9ed4ff13b7974b25a2d0b090f659d813
SHA256b38c73786b4b4b00600fe464c1ad369721b95ee7ddf012ab48e341a1239a607c
SHA512f2662971bf2b45ded8b05ca937203d6ea03a444e2f1a85765ca0a293ccfaaded387bedd467fbdafad1b7c8ad22af35aff8f72cf98660180390e874790d710fd2
-
Filesize
765B
MD5a4a4219ce5fdbaf2864b04ca4e453ac9
SHA198bf1383e8b2f4db0388ee139ae7fe06ff7a67a9
SHA2567ce64a6d79d1772713cf59d6575aec39f9fa00690d4c84cd2f160081b0d412c6
SHA51222f5668719a58a4c1692ceb8aae48af9d5a53527d96431410587fa1f3f67ec9b5f0660c87fa9d931343e1be9b0f56f03c3fcd431cc2d67b104450b2ef792baa8
-
Filesize
57B
MD564d48c38a631be689a56641f229caedf
SHA101bcab8295fcf7923ccfc38f869666a64839bcbc
SHA2560c6dc311165d1fd8d0ed8f6fa385d208be4a66029a791d77a6f76ddd659fb564
SHA5122a052da6685cb0e4dcc199355d44d54c03c2d5780430274a79a543b2808cc5bbc2d23dc8e02080107c8b735cb361ba2b6198c63aff00918bd6cd5daea6c09bd9
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0