Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 18:18
Behavioral task
behavioral1
Sample
JaffaCakes118_4eec95ddd3a200d5267ad5d268b9b0b4.dll
Resource
win7-20241023-en
6 signatures
150 seconds
General
-
Target
JaffaCakes118_4eec95ddd3a200d5267ad5d268b9b0b4.dll
-
Size
93KB
-
MD5
4eec95ddd3a200d5267ad5d268b9b0b4
-
SHA1
433e7deb163d69d9de2495efc26403bfb0b87800
-
SHA256
2a69b3eb2f254e0bbe89787d81e5e874aa49af33b33355e4efde5f9f214b8cb4
-
SHA512
8c13360aeba70ee50bf7388bf18aa63bc291f4d8a86e9d6b3ea70f58ccfe78abcb00d2691a8c42e4438c4d64b19401a8209db7269ff99c52875af88b8dd69951
-
SSDEEP
1536:ANx1NpOvjkUa61qABhrYdlcgsXRzXkFXtJx8PlHXpra9+sJiZixMexk1JKjpHTN0:ANx1ukPEXr/1tXkFdJiPlHZO9+v2hxNF
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1860-2-0x0000000062C20000-0x0000000062C56000-memory.dmp family_gh0strat -
Gh0strat family
-
resource yara_rule behavioral1/memory/1860-0-0x0000000062C20000-0x0000000062C56000-memory.dmp vmprotect behavioral1/memory/1860-2-0x0000000062C20000-0x0000000062C56000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1260 wrote to memory of 1860 1260 rundll32.exe 30 PID 1260 wrote to memory of 1860 1260 rundll32.exe 30 PID 1260 wrote to memory of 1860 1260 rundll32.exe 30 PID 1260 wrote to memory of 1860 1260 rundll32.exe 30 PID 1260 wrote to memory of 1860 1260 rundll32.exe 30 PID 1260 wrote to memory of 1860 1260 rundll32.exe 30 PID 1260 wrote to memory of 1860 1260 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4eec95ddd3a200d5267ad5d268b9b0b4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4eec95ddd3a200d5267ad5d268b9b0b4.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1860
-