Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 12:10
Behavioral task
behavioral1
Sample
JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe
-
Size
127KB
-
MD5
4d433a6d3057a380794c27c922f183e0
-
SHA1
bf4fc0a4c8e649a2b5b3448f79f2ca71962696e3
-
SHA256
22ce49c9d097e5a135d6c69f73435f019018829d1e592babb6e9f4277f72adcd
-
SHA512
7aefe5eebb107ab15fd872581d2538bdfb8fe58734988baa0e21adaa77a437345afde0dd870496b2471595d8908fd8e1f213ea921514186b7dc0465241578bb9
-
SSDEEP
3072:3NRcPShP4nOAe9gcNOQXbXTCeUd7AfloeMslsJ2:3NKPSwsgmjTdy7AfeeMs6
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1696-0-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat behavioral1/files/0x0007000000019278-2.dat family_gh0strat behavioral1/memory/1696-4-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2456 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 svchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\data.dll JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\plugin_info.ini JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe Token: SeRestorePrivilege 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe Token: SeBackupPrivilege 2496 svchost.exe Token: SeRestorePrivilege 2496 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2456 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe 32 PID 1696 wrote to memory of 2456 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe 32 PID 1696 wrote to memory of 2456 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe 32 PID 1696 wrote to memory of 2456 1696 JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4d433a6d3057a380794c27c922f183e0.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2456
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5ac0237d3e3884ab62ae7b843eff94aef
SHA13f6456609dd135e1cb17e0de54d6d34211ea5091
SHA256e0beca2a79b99d425f48b64c5a767e9fd11c22eb254af95e6af89f5b71d82796
SHA5127937bada3f6865e2363c53eebe777f0e02caac8e6a10221abb41a8336a07b9e8b3bf24e3fd2b786fa477d626565d162c136041d39a37e225200393c8ec42f954