Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 11:57
Behavioral task
behavioral1
Sample
JaffaCakes118_4d33c51ee2f92ccbeead9372391f1ea4.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_4d33c51ee2f92ccbeead9372391f1ea4.dll
-
Size
104KB
-
MD5
4d33c51ee2f92ccbeead9372391f1ea4
-
SHA1
c1303634c183cd5f27a4918ad329530de0b6e024
-
SHA256
3a17213ca0f2607bfdb6d5b08e1eb0231cf9a0bd99ea4d720ae291c5facac72e
-
SHA512
323c8eb34c4817220b498b58ad3bce5b7981b2a8e5f8bbca4bf7820053351e3b409ba74071a99058055493131451c690e5c579e7edb5a31b75dbfb968a052c2a
-
SSDEEP
1536:h1WBOdCYW5wQWTrG4MVPnXIJicCL01fB70pSPA0h+YzuG/WIG2:bWuWoG4QPX1P0tB70MPA0h+YzuGuIG2
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4844-0-0x0000000010000000-0x0000000010022000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 4844 220 rundll32.exe 86 PID 220 wrote to memory of 4844 220 rundll32.exe 86 PID 220 wrote to memory of 4844 220 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d33c51ee2f92ccbeead9372391f1ea4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d33c51ee2f92ccbeead9372391f1ea4.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4844
-