Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 09:58

General

  • Target

    JaffaCakes118_4caae72ac0b1d2a5180b007f8fd770c2.exe

  • Size

    175KB

  • MD5

    4caae72ac0b1d2a5180b007f8fd770c2

  • SHA1

    da2b497207fe11182b82f703165c88ac5e0e6097

  • SHA256

    2e23527092214412682e1a357a5fe51f63ef36012dfdd579b95290bc861aefeb

  • SHA512

    7c3a3f0d7840b906ddca9c37ca99daa4dcca8a791ebb8bd0e1e1aa74516b01151945e87090e249cdc1ebc7bc1ff8886414d1a448a523394d0e7ecbc044f699d6

  • SSDEEP

    3072:+0SpUMepbCwVK2xCMS7lgjp8hRaqp3yVoUlfVvRvFdaXRjdUsO/j7fjHt8JGC:iUMIb9jxOgjWhRaU34VRhFdaXHXO/j7x

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4caae72ac0b1d2a5180b007f8fd770c2.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4caae72ac0b1d2a5180b007f8fd770c2.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4888
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe

    Filesize

    175KB

    MD5

    8dbf1339e331381344e61628d4eb849c

    SHA1

    47ea8449f313dae8a07a27e2aba5224b4c86044b

    SHA256

    343b7c35986bc5841a4fd6eb0434f491a119325a26d90041ededd93dbba3be2a

    SHA512

    1c7be790882c6c80297dea471667f35c43e0a80e11e7381ef6089b1d3244c4ac9c8b162f55fd682ac5c5382319dfc0fde55062059e098efa9c4365ff9b017563

  • \??\c:\windows\SysWOW64\ntfastuserswitchingcompatibility.dll

    Filesize

    148KB

    MD5

    93c11972fd68942cbdf19e3ca1457329

    SHA1

    58e1bdb94d5b3fe602cd21abbc785e461a63c807

    SHA256

    f3d853f703039dc0f8384ac61cddfc1b477e2c5adcaf9b101e94b08dc352aa4b

    SHA512

    e56b05201783a2c3175ae7ad78c0a8c45cefea509189b708bb6ac337a17baa97e1ec0fca160fe5d555c3ed15a333f6f05200787d89b7b2499088272ae9c6c3d6

  • memory/4220-0-0x0000000001000000-0x0000000001057000-memory.dmp

    Filesize

    348KB

  • memory/4220-3-0x000000000104D000-0x000000000104E000-memory.dmp

    Filesize

    4KB

  • memory/4220-2-0x0000000001000000-0x0000000001057000-memory.dmp

    Filesize

    348KB

  • memory/4220-13-0x0000000001000000-0x0000000001057000-memory.dmp

    Filesize

    348KB