Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 13:41
Behavioral task
behavioral1
Sample
JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe
-
Size
166KB
-
MD5
4daff618415bab6a404cfc45fc2f30e7
-
SHA1
50fd762cd008f66d086c832bc0683651f851797b
-
SHA256
2472453da7a254fda3208ba151cb60ba9818ef2582ea740e2000ddce72979a6b
-
SHA512
e9e51bc96da01be63b2b942b86f16cdfd07a08fb27a0ad0e329478dee18e920741e5db7c99435fa8b941f043b1a89ff3a57aab197f9ed0bea2f99527dfa657f7
-
SSDEEP
3072:hQixrcYyNNBxIf58d6UuSMhXk22T94oz7vEEZzcEWJO7Ri+FZBvby6M:hhANBxIxh0u4TSg7vECzcJ07Rp3p
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000023c97-2.dat family_gh0strat behavioral2/files/0x000600000001e729-11.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 1592 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe 1592 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Fbcd\Kbcdefghi.psd JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe File created C:\Program Files (x86)\Fbcd\Kbcdefghi.psd JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe 1592 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeRestorePrivilege 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeBackupPrivilege 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeRestorePrivilege 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeBackupPrivilege 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeRestorePrivilege 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeBackupPrivilege 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe Token: SeRestorePrivilege 4744 JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4daff618415bab6a404cfc45fc2f30e7.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD598bad2405523fdcea0a43bcc9f105f3c
SHA1291fbf6b13428e953473771667cadff1135d7308
SHA2564cf3f23aca1e8e7d5a4b3437bec9fe5f28e70936641ea6324aa99f2c5208d8e2
SHA51213bdee47530ffface75c2223aba4157307ce312aa77094533c65d96d9a4ee4dfab878ddbfabbd80fd059ab99612dd4fa9300b20e6332bbce866c10fdff92a055
-
Filesize
98B
MD59b7a3761bee68efef8ac6794d5428a98
SHA197acd2fb9bc97886defdf98ada373cf8cf739f6f
SHA256d77b92564ba6052408e68987c9f1677e4bfc5cf103a2d2448312cf495d15e06c
SHA51241f782d79ca51e9fb889c9e9edd43a9992e7808448494e9ee9da526b16c9eabe75fbf854414734780490496c3c61d852ae5aa9b7d14f101af8db1497196c4a13
-
Filesize
6.9MB
MD5dea133bfe93b24bb1a1b43d4e30e3273
SHA1b99dad1d085cd81f7b9acdc2ed460430144f14a4
SHA256faec17a79327ec8b8e1bfffbb9efee955984789c9c0a6959070bda02e8166351
SHA5121f9b1b949a65ac5105cdc6af9c77578f7ec8368fa6c6a336e000661898f8889714f87961da1aeed9255f1b1345743fa38d405deb112f96ea6e8bbe85adb7f9e4