Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 12:05

General

  • Target

    JaffaCakes118_4d3e56221f100e855d5d7f06933a7ce0.dll

  • Size

    124KB

  • MD5

    4d3e56221f100e855d5d7f06933a7ce0

  • SHA1

    bf3876974c2ca55f69520be5e4c63694272524e6

  • SHA256

    6c83012626a72ebf6197dd2e4a14b1419a956b4269e0b01a9786d9ca3a46749c

  • SHA512

    06b29bf78f346460641887da412dc3ac6694c82ea22e0bdaaf91634d944435c8297466a9a9bb94ba86590c1258357be99b2a4d136349c819c2c277d003f85885

  • SSDEEP

    3072:Bzk9z4Uh+yQAbAbu9NWtMpebimeN7kgMwDi/:uDTQAbNMbxg7kVwD

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d3e56221f100e855d5d7f06933a7ce0.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d3e56221f100e855d5d7f06933a7ce0.dll,#1
      2⤵
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4080
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\program files (x86)\common files\llssrv.jpg

    Filesize

    186KB

    MD5

    4f8290ac37eae27883ee805804623508

    SHA1

    ee33c3b53c3dcaf9d271707312848e0608d11485

    SHA256

    f6fee9f8433f79534e4a589ebb81bf076febdb90d4f506660b16500eda10d6fa

    SHA512

    b9e1a239f0f1305a5d715f4b11af660dbaeb4b252b1b109cab89662d48e538f83749b156692c8b6610aa2bf4ba6df799e12c0b33efe97e7587f7c9f6c384eecd