Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 14:04
Behavioral task
behavioral1
Sample
JaffaCakes118_4dc778ab796935ea554a366642eb0f1f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4dc778ab796935ea554a366642eb0f1f.exe
-
Size
254KB
-
MD5
4dc778ab796935ea554a366642eb0f1f
-
SHA1
066b9ff01ffb7fab52a8c114f8f92418a3efe6c2
-
SHA256
a121eb6d3f5780a07d1457c80b7a759d76e301314346a2f148bd9ba3919c474b
-
SHA512
89bdaf201bad7d8c252ec86c9aa724cfd68983c5347b5cc0fa13f501f30bcb5ed05a4c2011ab83de5436aeb905a180f3272d73447b5bbbd4560750002bc782a6
-
SSDEEP
6144:T9Z3mSZFP2mbDSwPpIzylwIqBcrWn4FKc:hrOmPpIATOUNEc
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2684-0-0x0000000000400000-0x0000000000441000-memory.dmp family_gh0strat behavioral1/files/0x0008000000016d0e-4.dat family_gh0strat behavioral1/memory/2684-5-0x0000000000400000-0x0000000000441000-memory.dmp family_gh0strat behavioral1/memory/1652-7-0x0000000010000000-0x0000000010030000-memory.dmp family_gh0strat behavioral1/memory/1652-8-0x0000000010000000-0x0000000010030000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360svc\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\ntuser.dll" JaffaCakes118_4dc778ab796935ea554a366642eb0f1f.exe -
Deletes itself 1 IoCs
pid Process 1652 svCHoSt.exe -
Loads dropped DLL 1 IoCs
pid Process 1652 svCHoSt.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4dc778ab796935ea554a366642eb0f1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svCHoSt.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2684 JaffaCakes118_4dc778ab796935ea554a366642eb0f1f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4dc778ab796935ea554a366642eb0f1f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4dc778ab796935ea554a366642eb0f1f.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
C:\Windows\SysWOW64\svCHoSt.exeC:\Windows\SysWOW64\svCHoSt.exe -K nETSvCS1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD5c8b966c0e8010fe0fa831c7d870eef71
SHA182b78982684ef5766948b474515f5d43920cc8ce
SHA256668888b27addb6a05f2d44fefa9754b510a3f2d27c81e4446569ee92fb7615a5
SHA512c5b615a49b27107fe430263c3ffde26d419e1195ca4167be1137d364eb37483a8cd7317882b73c976a1e39384ba4f77cade94533408e95950e8502f6bef30353