Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 18:19
Behavioral task
behavioral1
Sample
JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe
-
Size
1.4MB
-
MD5
4eeca5401a0b3f222374edd11bc3fbbb
-
SHA1
c4d2be8c18b799756e4a15267c2071d4a6ad6c1b
-
SHA256
cc36b7ea338099ef2829f72e5c435a4554a1c06e1eef30fc9e59982022cf7d86
-
SHA512
46915011543a8a0a139e9d99987612fe8e5e8dd0953b056bfdbfc980f422147d7a5747d1a71d5e44d22e751c58ee4cef80ecadcc6efbf5eb21d6cce7b1a03d03
-
SSDEEP
24576:z977daDkp58ZQ1dGlDUx1gjC6qFwMM7m33xkYRG6MozaB3nqKMEMYsBjM:p74DY8ZDDUxaC9wM3B46Mo2dqZEuBjM
Malware Config
Signatures
-
Gh0st RAT payload 17 IoCs
resource yara_rule behavioral1/memory/2744-65-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/files/0x0009000000016241-76.dat family_gh0strat behavioral1/memory/1144-81-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-84-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-85-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-86-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-87-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-88-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-89-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-90-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-91-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-92-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-93-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-94-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-95-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-96-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat behavioral1/memory/1144-97-0x0000000000400000-0x00000000005AB000-memory.dmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{dnmuevav-omsc-xbac-bimt-zjoxmlmtrptr} server2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{dnmuevav-omsc-xbac-bimt-zjoxmlmtrptr}\stubpath = "C:\\Windows\\system32\\invhwkmle.exe" server2.exe -
Executes dropped EXE 4 IoCs
pid Process 2320 ~__UNINST.EXE 2744 server2.exe 2656 ¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe 1144 invhwkmle.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine ~__UNINST.EXE Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine server2.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine invhwkmle.exe -
Loads dropped DLL 19 IoCs
pid Process 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 2320 ~__UNINST.EXE 2320 ~__UNINST.EXE 2320 ~__UNINST.EXE 2320 ~__UNINST.EXE 2320 ~__UNINST.EXE 2744 server2.exe 2744 server2.exe 2744 server2.exe 2320 ~__UNINST.EXE 2320 ~__UNINST.EXE 2656 ¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe 2656 ¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe 2656 ¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe 2744 server2.exe 1144 invhwkmle.exe 1144 invhwkmle.exe 1144 invhwkmle.exe 1144 invhwkmle.exe -
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x000000000057C000-memory.dmp themida behavioral1/memory/2096-4-0x0000000000400000-0x000000000057C000-memory.dmp themida behavioral1/files/0x000a00000001202a-7.dat themida behavioral1/memory/2320-14-0x0000000000400000-0x000000000057C000-memory.dmp themida behavioral1/memory/2320-22-0x0000000000400000-0x000000000057C000-memory.dmp themida behavioral1/memory/2320-25-0x0000000004BE0000-0x0000000004BF0000-memory.dmp themida behavioral1/files/0x0008000000016241-26.dat themida behavioral1/memory/2744-35-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/2320-33-0x0000000004BE0000-0x0000000004D8B000-memory.dmp themida behavioral1/files/0x0008000000015f71-58.dat themida behavioral1/memory/1144-70-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/2744-65-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-81-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-84-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-85-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-86-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-87-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-88-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-89-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-90-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-91-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-92-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-93-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-94-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-95-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-96-0x0000000000400000-0x00000000005AB000-memory.dmp themida behavioral1/memory/1144-97-0x0000000000400000-0x00000000005AB000-memory.dmp themida -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\invhwkmle.exe server2.exe File created C:\Windows\SysWOW64\syslog.dat server2.exe File opened for modification C:\Windows\SysWOW64\invhwkmle.exe_lang.ini server2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 2320 ~__UNINST.EXE 2744 server2.exe 1144 invhwkmle.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invhwkmle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~__UNINST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server2.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 2320 ~__UNINST.EXE 2744 server2.exe 2744 server2.exe 1144 invhwkmle.exe 1144 invhwkmle.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2744 server2.exe Token: SeDebugPrivilege 1144 invhwkmle.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2656 ¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe 1144 invhwkmle.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2320 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 30 PID 2096 wrote to memory of 2320 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 30 PID 2096 wrote to memory of 2320 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 30 PID 2096 wrote to memory of 2320 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 30 PID 2096 wrote to memory of 2320 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 30 PID 2096 wrote to memory of 2320 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 30 PID 2096 wrote to memory of 2320 2096 JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe 30 PID 2320 wrote to memory of 2744 2320 ~__UNINST.EXE 31 PID 2320 wrote to memory of 2744 2320 ~__UNINST.EXE 31 PID 2320 wrote to memory of 2744 2320 ~__UNINST.EXE 31 PID 2320 wrote to memory of 2744 2320 ~__UNINST.EXE 31 PID 2320 wrote to memory of 2744 2320 ~__UNINST.EXE 31 PID 2320 wrote to memory of 2744 2320 ~__UNINST.EXE 31 PID 2320 wrote to memory of 2744 2320 ~__UNINST.EXE 31 PID 2320 wrote to memory of 2656 2320 ~__UNINST.EXE 32 PID 2320 wrote to memory of 2656 2320 ~__UNINST.EXE 32 PID 2320 wrote to memory of 2656 2320 ~__UNINST.EXE 32 PID 2320 wrote to memory of 2656 2320 ~__UNINST.EXE 32 PID 2320 wrote to memory of 2656 2320 ~__UNINST.EXE 32 PID 2320 wrote to memory of 2656 2320 ~__UNINST.EXE 32 PID 2320 wrote to memory of 2656 2320 ~__UNINST.EXE 32 PID 2744 wrote to memory of 1144 2744 server2.exe 33 PID 2744 wrote to memory of 1144 2744 server2.exe 33 PID 2744 wrote to memory of 1144 2744 server2.exe 33 PID 2744 wrote to memory of 1144 2744 server2.exe 33 PID 2744 wrote to memory of 1144 2744 server2.exe 33 PID 2744 wrote to memory of 1144 2744 server2.exe 33 PID 2744 wrote to memory of 1144 2744 server2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE"C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\server2.exe"C:\Users\Admin\AppData\Local\Temp\server2.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe ZhuDongdelC:\Users\Admin\AppData\Local\Temp\server2.exe4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
-
C:\Users\Admin\AppData\Local\Temp\¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe"C:\Users\Admin\AppData\Local\Temp\¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe" ADN3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD511b4e15ad412ebb56d26daf35a9a551b
SHA145d7642fc53321717347ac8af0cce58be5c66316
SHA256f723295d530e13f94acb477af1b04dff558ae038b6beac59e329e3c317c76448
SHA512fa8773a270b0ee690a60ce5191255ec997f814098b625aaae06f902faa277f4b82b9fef9ce8d45c430993166503448db5ac52e68c1444ec92187f7a406b29d59
-
Filesize
117KB
MD5151c3f0b08c18f3e886dfb7ce84b107d
SHA1177ec7e2701b1a1c52d29c8fc2793f03fd4d7df0
SHA256d3bbd4f07d42c2d62c5be7f5cadda7c4b8085e897720f9b77b548bb5336d32f5
SHA512123b45797d2012f43561962e81f0ca6fc9b0b4aab46a2061027420c2a553654f61261785ea1cbfea1bf9a62ace21a6c13b6f66813d272279b23562ad3c5e2bbf
-
Filesize
784KB
MD5b55a0047db1fbcfdf6b435333064c8ae
SHA19d113076ae6b960f8ec2d8bb22b0c1fe42e1db1b
SHA256ec1bf7648686b7920ecbbdda45091909a165af9185258687892052f607167ecd
SHA512e09c9c653a0f0fefdf7692e8d71c9882e4837e686bd4f2aec30a039bba7ae0f7f363c6c511d688bcfb615e514f2df89b12e8ee30d4d352386a14c6f3474bbd73
-
Filesize
1.4MB
MD54eeca5401a0b3f222374edd11bc3fbbb
SHA1c4d2be8c18b799756e4a15267c2071d4a6ad6c1b
SHA256cc36b7ea338099ef2829f72e5c435a4554a1c06e1eef30fc9e59982022cf7d86
SHA51246915011543a8a0a139e9d99987612fe8e5e8dd0953b056bfdbfc980f422147d7a5747d1a71d5e44d22e751c58ee4cef80ecadcc6efbf5eb21d6cce7b1a03d03
-
Filesize
20KB
MD5e45425d7acee934041df3de2ddee32e7
SHA17335683beca341102e77d61a207abe4953e56766
SHA256281070adc884bbcf4331bb79781e505d1b7d03922bfc6b1841f80713a883ab23
SHA51281acb0d8248e5c4b64f1882a955f8da38589b93d46793e10a2478179c09282906fd40d403f5b3305b1d3ae8f5baa87b935f003bf1e24e509a017ecbfa76fbb5f