Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 13:41
Behavioral task
behavioral1
Sample
JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe
-
Size
166KB
-
MD5
4daff618415bab6a404cfc45fc2f30e7
-
SHA1
50fd762cd008f66d086c832bc0683651f851797b
-
SHA256
2472453da7a254fda3208ba151cb60ba9818ef2582ea740e2000ddce72979a6b
-
SHA512
e9e51bc96da01be63b2b942b86f16cdfd07a08fb27a0ad0e329478dee18e920741e5db7c99435fa8b941f043b1a89ff3a57aab197f9ed0bea2f99527dfa657f7
-
SSDEEP
3072:hQixrcYyNNBxIf58d6UuSMhXk22T94oz7vEEZzcEWJO7Ri+FZBvby6M:hhANBxIxh0u4TSg7vECzcJ07Rp3p
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000b000000019230-5.dat family_gh0strat behavioral1/memory/2368-10-0x0000000010000000-0x0000000010025000-memory.dmp family_gh0strat behavioral1/files/0x000c00000001226d-12.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2364 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Fbcd\Kbcdefghi.psd JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe File created C:\Program Files (x86)\Fbcd\Kbcdefghi.psd JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 2368 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeRestorePrivilege 2368 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeBackupPrivilege 2368 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeRestorePrivilege 2368 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeBackupPrivilege 2368 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeRestorePrivilege 2368 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeBackupPrivilege 2368 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeRestorePrivilege 2368 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD598bad2405523fdcea0a43bcc9f105f3c
SHA1291fbf6b13428e953473771667cadff1135d7308
SHA2564cf3f23aca1e8e7d5a4b3437bec9fe5f28e70936641ea6324aa99f2c5208d8e2
SHA51213bdee47530ffface75c2223aba4157307ce312aa77094533c65d96d9a4ee4dfab878ddbfabbd80fd059ab99612dd4fa9300b20e6332bbce866c10fdff92a055
-
Filesize
3.5MB
MD50f25b3a1050059e3ac8ddbd102ea53ef
SHA1af5eb56a8ae61738594421321d7f645670b8ce6b
SHA256d0328f90474f6af528e9dd37c8af18deadf7e1e540339387a072b541268f8da4
SHA51206d165ea8fc754f18f0db53d4ffee6d9e9203c40a2e6927da2afce1d4c98392c545fcc851fe0e60e0ba69b0d87ad6f6629e347a26a06cd6d9f987fe75f3b0325
-
Filesize
99B
MD5263470590c38e7aacfae8b7132d3e7ab
SHA10bcdd2c7c70bbe346fa703078cdd269f1bb48016
SHA25686a995f8152722fde195a05695059a9295dbd5754409afe46460649b74e30f7a
SHA5129864b945756cbd35a0a7e6a3a03b118ab9b3553c8ab67fb23f02dce5ed73daed62a3bb03fd7d24095541f4080674c3064e0650caeb4f40ea8961c986d2229842