Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 01:26
Behavioral task
behavioral1
Sample
JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe
-
Size
129KB
-
MD5
4fdebb68b2cdb96a447b4a72981d386d
-
SHA1
5ee8eac36776fb79c47191db8465ae50fbb1cfcc
-
SHA256
e598ba5c9be92eb08aaa84d73fcc3dc242eb7170765b27d0c71082156e9cd549
-
SHA512
a4df944d361080f47c45583bbe092b5806528f0d52a5b7e3a6462b1e443c6cf8d66dfcecb5700a6946588e6b09d74c6e97eb714ce74cc8bbd3faee3a64a0eba4
-
SSDEEP
3072:7SBwLvnQ+/7IRy3TPlYw9mpG2BybS6TcpPZcLgSv:7SBwLvnQ+TW+Dmw9mp/WSAiPZVa
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2280-0-0x0000000000400000-0x0000000000423000-memory.dmp family_gh0strat behavioral1/files/0x0007000000012116-5.dat family_gh0strat behavioral1/memory/2280-8-0x0000000000400000-0x0000000000423000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msgsvc.dll JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe File created C:\Windows\SysWOW64\dllcache\msgsvc.dll JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe File created C:\Windows\SysWOW64\msgsvc.dll JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServicePackFiles\i386\msgsvc.dll JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe Token: SeDebugPrivilege 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe Token: SeDebugPrivilege 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe Token: SeDebugPrivilege 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe Token: SeDebugPrivilege 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe Token: SeDebugPrivilege 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe Token: SeDebugPrivilege 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe Token: SeIncBasePriorityPrivilege 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2764 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe 30 PID 2280 wrote to memory of 2764 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe 30 PID 2280 wrote to memory of 2764 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe 30 PID 2280 wrote to memory of 2764 2280 JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fdebb68b2cdb96a447b4a72981d386d.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C DEL C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD589714e2b3a0772b7d2adabf0ae4a8e07
SHA1e7388553de3a0f6ce30373c863e85579a6862477
SHA25664ff234670c09a0d6ab18f13c48dda31a907dc1a8c7bad8e29fd7e8ab456fe8d
SHA512798c33dbd6c2d3f3ec1511845a4eb52c15bd8ebff06719987c8545c1710e125494655778de1055a1bf60de2eb2d9a5e7657aa0d42785cd53a4c133065230401f