Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2025, 18:19

General

  • Target

    JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe

  • Size

    1.4MB

  • MD5

    4eeca5401a0b3f222374edd11bc3fbbb

  • SHA1

    c4d2be8c18b799756e4a15267c2071d4a6ad6c1b

  • SHA256

    cc36b7ea338099ef2829f72e5c435a4554a1c06e1eef30fc9e59982022cf7d86

  • SHA512

    46915011543a8a0a139e9d99987612fe8e5e8dd0953b056bfdbfc980f422147d7a5747d1a71d5e44d22e751c58ee4cef80ecadcc6efbf5eb21d6cce7b1a03d03

  • SSDEEP

    24576:z977daDkp58ZQ1dGlDUx1gjC6qFwMM7m33xkYRG6MozaB3nqKMEMYsBjM:p74DY8ZDDUxaC9wM3B46Mo2dqZEuBjM

Malware Config

Signatures

  • Gh0st RAT payload 17 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 19 IoCs
  • Themida packer 27 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe"
    1⤵
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE
      "C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4eeca5401a0b3f222374edd11bc3fbbb.exe
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Users\Admin\AppData\Local\Temp\server2.exe
        "C:\Users\Admin\AppData\Local\Temp\server2.exe"
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Windows\SysWOW64\invhwkmle.exe
          C:\Windows\system32\invhwkmle.exe ZhuDongdelC:\Users\Admin\AppData\Local\Temp\server2.exe
          4⤵
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1144
      • C:\Users\Admin\AppData\Local\Temp\¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe
        "C:\Users\Admin\AppData\Local\Temp\¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe" ADN
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\invhwkmle.exe

    Filesize

    784KB

    MD5

    11b4e15ad412ebb56d26daf35a9a551b

    SHA1

    45d7642fc53321717347ac8af0cce58be5c66316

    SHA256

    f723295d530e13f94acb477af1b04dff558ae038b6beac59e329e3c317c76448

    SHA512

    fa8773a270b0ee690a60ce5191255ec997f814098b625aaae06f902faa277f4b82b9fef9ce8d45c430993166503448db5ac52e68c1444ec92187f7a406b29d59

  • \Users\Admin\AppData\Local\Temp\259435153_lang.dll

    Filesize

    117KB

    MD5

    151c3f0b08c18f3e886dfb7ce84b107d

    SHA1

    177ec7e2701b1a1c52d29c8fc2793f03fd4d7df0

    SHA256

    d3bbd4f07d42c2d62c5be7f5cadda7c4b8085e897720f9b77b548bb5336d32f5

    SHA512

    123b45797d2012f43561962e81f0ca6fc9b0b4aab46a2061027420c2a553654f61261785ea1cbfea1bf9a62ace21a6c13b6f66813d272279b23562ad3c5e2bbf

  • \Users\Admin\AppData\Local\Temp\server2.exe

    Filesize

    784KB

    MD5

    b55a0047db1fbcfdf6b435333064c8ae

    SHA1

    9d113076ae6b960f8ec2d8bb22b0c1fe42e1db1b

    SHA256

    ec1bf7648686b7920ecbbdda45091909a165af9185258687892052f607167ecd

    SHA512

    e09c9c653a0f0fefdf7692e8d71c9882e4837e686bd4f2aec30a039bba7ae0f7f363c6c511d688bcfb615e514f2df89b12e8ee30d4d352386a14c6f3474bbd73

  • \Users\Admin\AppData\Local\Temp\~__UNINST.EXE

    Filesize

    1.4MB

    MD5

    4eeca5401a0b3f222374edd11bc3fbbb

    SHA1

    c4d2be8c18b799756e4a15267c2071d4a6ad6c1b

    SHA256

    cc36b7ea338099ef2829f72e5c435a4554a1c06e1eef30fc9e59982022cf7d86

    SHA512

    46915011543a8a0a139e9d99987612fe8e5e8dd0953b056bfdbfc980f422147d7a5747d1a71d5e44d22e751c58ee4cef80ecadcc6efbf5eb21d6cce7b1a03d03

  • \Users\Admin\AppData\Local\Temp\¹Ì¼Ò_¾ËÁýŸÀ̹Ö.exe

    Filesize

    20KB

    MD5

    e45425d7acee934041df3de2ddee32e7

    SHA1

    7335683beca341102e77d61a207abe4953e56766

    SHA256

    281070adc884bbcf4331bb79781e505d1b7d03922bfc6b1841f80713a883ab23

    SHA512

    81acb0d8248e5c4b64f1882a955f8da38589b93d46793e10a2478179c09282906fd40d403f5b3305b1d3ae8f5baa87b935f003bf1e24e509a017ecbfa76fbb5f

  • memory/1144-88-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-90-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-97-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-96-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-95-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-94-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-93-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-92-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-91-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-83-0x00000000005B0000-0x000000000075B000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-89-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-87-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-72-0x00000000005B0000-0x000000000075B000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-86-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-70-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-85-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-73-0x00000000005B0000-0x000000000075B000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-84-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-81-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/1144-82-0x00000000005B0000-0x000000000075B000-memory.dmp

    Filesize

    1.7MB

  • memory/2096-0-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/2096-4-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/2096-11-0x00000000045E0000-0x000000000475C000-memory.dmp

    Filesize

    1.5MB

  • memory/2096-1-0x0000000004160000-0x0000000004162000-memory.dmp

    Filesize

    8KB

  • memory/2096-2-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/2096-6-0x0000000004210000-0x0000000004220000-memory.dmp

    Filesize

    64KB

  • memory/2320-33-0x0000000004BE0000-0x0000000004D8B000-memory.dmp

    Filesize

    1.7MB

  • memory/2320-14-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/2320-25-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

    Filesize

    64KB

  • memory/2320-22-0x0000000000400000-0x000000000057C000-memory.dmp

    Filesize

    1.5MB

  • memory/2744-49-0x0000000000C40000-0x0000000000DEB000-memory.dmp

    Filesize

    1.7MB

  • memory/2744-50-0x0000000000C40000-0x0000000000DEB000-memory.dmp

    Filesize

    1.7MB

  • memory/2744-51-0x0000000000C40000-0x0000000000DEB000-memory.dmp

    Filesize

    1.7MB

  • memory/2744-35-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB

  • memory/2744-65-0x0000000000400000-0x00000000005AB000-memory.dmp

    Filesize

    1.7MB