Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 11:46

General

  • Target

    JaffaCakes118_4d27d809fa2ee20883e49e8bdc9d2150.dll

  • Size

    912KB

  • MD5

    4d27d809fa2ee20883e49e8bdc9d2150

  • SHA1

    64d216af04a3043fb817f848fbc97be62fe15958

  • SHA256

    f4cc9e1e3dd233cd9fc38f14524787fa9cb15630a68351f33de9c9087eebb44d

  • SHA512

    d19e405214f8bc2a7eecb80bc46061b8cb7fd0e362667745f44285babd1452e427130accd6921cacef920656762160602cd8fdb7c1634db67d50fd14a00fd51e

  • SSDEEP

    24576:wEJ17LwBnlm+jSyMhLvhoqQ5gJFCcEwIxSOlgfo:hJ1IQQSFhLezqFGwIxRg

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d27d809fa2ee20883e49e8bdc9d2150.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d27d809fa2ee20883e49e8bdc9d2150.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Users\Admin\AppData\Local\Temp\hrlB3FE.tmp
        C:\Users\Admin\AppData\Local\Temp\hrlB3FE.tmp
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Windows\SysWOW64\inyjbrycn.exe
          C:\Windows\system32\inyjbrycn.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3400
          • C:\Windows\SysWOW64\userinit.exe
            userinit.exe
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:4048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\240630468_lang.dll

    Filesize

    122KB

    MD5

    c39be57414086fdc5011ec0f54b50ec5

    SHA1

    06889ce0323435969b99ea6548ae4a9607433e50

    SHA256

    991f16b1e3007db235bda09227b253a62ee4923c854da5056d301a49d9603b1f

    SHA512

    91c347be4b7dab5ccd5f5d3e962cd160f7ebc584dd78732aac2b307262ff1b61093050c00e5a1bf2dd6d14d4ca31994f2ae7380f8164f5df110be5acbf2facc8

  • C:\Users\Admin\AppData\Local\Temp\hrlB3FE.tmp

    Filesize

    902KB

    MD5

    4356e7758188f0cad761016f0ac96d92

    SHA1

    efeee9d485e2584141499f35d770a43fba35ab59

    SHA256

    deae3fff3c99801bc66eed7b2a0da62b75f056ebbb781134c4cb8431ca48fcf8

    SHA512

    af4e151d37d78b6aacd166e784fd432a65fbedc0d697ee7bb7e0d9f98f29bef79ff6e354faa943d424a97162a019a9067a9ad818018e68423c804483441d97a9

  • C:\Windows\SysWOW64\inyjbrycn.exe

    Filesize

    902KB

    MD5

    227fd9c687c8df44431b78874f282e7e

    SHA1

    d2e2fa028dc1affd39da64c7cd9ba0fa45451f35

    SHA256

    28d116164da1f7a93d327df7ba2139bbd1f89158d3ae8ff20ab06b355f63ba8d

    SHA512

    7c60f82d7a245446facf969bf08462921bfcd07d4d9d66e30bac412affd13b5ec1a5c2690269a69c886eb0b15956b81c87f41541f15e13aa119d96f48abfae9c

  • memory/3400-14-0x0000000000400000-0x00000000005F0000-memory.dmp

    Filesize

    1.9MB

  • memory/3400-15-0x00007FFD79250000-0x00007FFD79445000-memory.dmp

    Filesize

    2.0MB

  • memory/3400-21-0x0000000000400000-0x00000000005F0000-memory.dmp

    Filesize

    1.9MB

  • memory/4988-4-0x0000000000400000-0x00000000005F0000-memory.dmp

    Filesize

    1.9MB

  • memory/4988-5-0x00007FFD79250000-0x00007FFD79445000-memory.dmp

    Filesize

    2.0MB

  • memory/4988-13-0x0000000000400000-0x00000000005F0000-memory.dmp

    Filesize

    1.9MB