Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe
-
Size
196KB
-
MD5
4cb85dc70ca46ce70499d1a8142f0f20
-
SHA1
79665c3a585de51d9b9853f902b11d0f2a3efa45
-
SHA256
6047cc605e0dfbee45f75d3aa49fc2f901cf1e3be1c356d02c416e9fa8ed1278
-
SHA512
7f92d77ad9261e40ac0885f8d0719dbe25b2ce8b51976e126b7695d590d9630403f542176b7eba4c876e7188ebcdbaf10bd89da7ba0119c8030ed8eee30f1619
-
SSDEEP
3072:Vgmn0avOvtYz4nqSioDXx4uE9w2qbMUeZPgrQ/O/46x4M15m:+w0avOvtYSiod4uYzqAvZd/246Hvm
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000186d9-11.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 1084 fxwqpqpfwg -
Executes dropped EXE 1 IoCs
pid Process 1084 fxwqpqpfwg -
Loads dropped DLL 3 IoCs
pid Process 1756 JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe 1756 JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe 2420 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\crfdeifbcp svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxwqpqpfwg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1084 fxwqpqpfwg 2420 svchost.exe 2420 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 1084 fxwqpqpfwg Token: SeBackupPrivilege 1084 fxwqpqpfwg Token: SeBackupPrivilege 1084 fxwqpqpfwg Token: SeRestorePrivilege 1084 fxwqpqpfwg Token: SeBackupPrivilege 2420 svchost.exe Token: SeRestorePrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeSecurityPrivilege 2420 svchost.exe Token: SeSecurityPrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeSecurityPrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeSecurityPrivilege 2420 svchost.exe Token: SeBackupPrivilege 2420 svchost.exe Token: SeRestorePrivilege 2420 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1084 1756 JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe 29 PID 1756 wrote to memory of 1084 1756 JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe 29 PID 1756 wrote to memory of 1084 1756 JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe 29 PID 1756 wrote to memory of 1084 1756 JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
\??\c:\users\admin\appdata\local\fxwqpqpfwg"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_4cb85dc70ca46ce70499d1a8142f0f20.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.0MB
MD57e43e1a8b6ed4d02f0c0a8a65ee2310d
SHA1144e4a3182dbdee19218561f649d56901a9e6818
SHA2566f1e10e007706799028d695386406b514372af886772e0a6b8b088f0181b1f7e
SHA512da079de4ba9c161918e4a1f355be419316bcaf44b5f115dc13c805411667f1664831bbd9be69d7a745fd23767fcc26d9f41c75fa20fe1daf5dee33c6d85795a1
-
Filesize
23.2MB
MD5af31c6458e5f12700200884dfaddfc38
SHA10ddc043132c0d960a910250a4571e50b4974fd7a
SHA2567a44a668fbf00787f106bfcdcb869f485631d6744a6937f4deb880695392cb8b
SHA512ac7d6680a2962529af5e3bff701ff946b19592e72ee63ec7f95219ec91d55d76cdb3cd8e31bf0b866a69a0ead47ff872c263a9238bd9f2782ca01a0f2fb48563