Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe
-
Size
275KB
-
MD5
505e0c2c5759b10808c9b29546a3aa0e
-
SHA1
86e7cfd584af0bea278ac30f0ddc1e861282637d
-
SHA256
ec3e374deb438ad64a5982cf0f120df981d5d9d35aeef0387a9e215e9f408fde
-
SHA512
4455b5274e77df224d225d9d68bd73e6533c9e8d2ece75461798161a8feabfb888fdbb2238e044610d50f40d6bba064a894114880fa1ba0c67c60133a9cebfc2
-
SSDEEP
6144:kbB5jfgexjptZL02vIMoIcGRU0MQmEMRxlroXnuUEF9GCpiQdgq:kbB5jfgexjrOA9NRPmxwX/itFR
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x00080000000120f4-19.dat family_gh0strat behavioral1/memory/2116-26-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2116-25-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/1696-27-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat behavioral1/memory/1696-44-0x0000000000400000-0x0000000000479000-memory.dmp family_gh0strat behavioral1/memory/2116-46-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 864 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2116 qiuqiu.exe 2940 qiuqiu.exe -
Loads dropped DLL 11 IoCs
pid Process 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 2116 qiuqiu.exe 2116 qiuqiu.exe 2116 qiuqiu.exe 2116 qiuqiu.exe 2116 qiuqiu.exe 2116 qiuqiu.exe 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 2940 qiuqiu.exe 2940 qiuqiu.exe 2940 qiuqiu.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 qiuqiu.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Common Files\maomao.dll JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe File created C:\Program Files\Common Files\qiuqiu.dll JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe File created C:\Program Files\Common Files\qiuqiu.exe JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe File opened for modification C:\Program Files\Common Files\qiuqiu.exe JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiuqiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qiuqiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qiuqiu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz qiuqiu.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1} qiuqiu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32\ = "C:\\Program Files\\Common Files\\qiuqiu.dll" qiuqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{438755C2-A8BA-11D1-B96B-00A0C90312E1}\InProcServer32 qiuqiu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID qiuqiu.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2116 qiuqiu.exe 2116 qiuqiu.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2116 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 30 PID 1696 wrote to memory of 2116 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 30 PID 1696 wrote to memory of 2116 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 30 PID 1696 wrote to memory of 2116 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 30 PID 1696 wrote to memory of 2116 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 30 PID 1696 wrote to memory of 2116 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 30 PID 1696 wrote to memory of 2116 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 30 PID 1696 wrote to memory of 2940 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 32 PID 1696 wrote to memory of 2940 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 32 PID 1696 wrote to memory of 2940 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 32 PID 1696 wrote to memory of 2940 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 32 PID 1696 wrote to memory of 2940 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 32 PID 1696 wrote to memory of 2940 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 32 PID 1696 wrote to memory of 2940 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 32 PID 2940 wrote to memory of 2884 2940 qiuqiu.exe 33 PID 2940 wrote to memory of 2884 2940 qiuqiu.exe 33 PID 2940 wrote to memory of 2884 2940 qiuqiu.exe 33 PID 2940 wrote to memory of 2884 2940 qiuqiu.exe 33 PID 2940 wrote to memory of 2884 2940 qiuqiu.exe 33 PID 2940 wrote to memory of 2884 2940 qiuqiu.exe 33 PID 2940 wrote to memory of 2884 2940 qiuqiu.exe 33 PID 1696 wrote to memory of 864 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 34 PID 1696 wrote to memory of 864 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 34 PID 1696 wrote to memory of 864 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 34 PID 1696 wrote to memory of 864 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 34 PID 1696 wrote to memory of 864 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 34 PID 1696 wrote to memory of 864 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 34 PID 1696 wrote to memory of 864 1696 JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_505e0c2c5759b10808c9b29546a3aa0e.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Common Files\qiuqiu.exe"C:\Program Files\Common Files\qiuqiu.exe" "C:\Program Files\Common Files\maomao.dll" ServiceMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Documents and Settings\qiuqiu.exe"C:\Documents and Settings\qiuqiu.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\DOCUME~1\qiuqiu.exe3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.1MB
MD54209abd2a62b369bddd0525759bc0d54
SHA1214bc8b806b763f7226ecd815db8fd9d7a35c525
SHA25681e9236805bf960cdaa5465093a694f09cd874abb7a666af173908bf21832850
SHA512dd7adb7bf1942051a189c2fc799ce16c8cfcb637a0f6993cfa3844514930c08fed8fa0a33eb8e1b2a60aec5cdbf2ca7c13e5e25a338f2194d647fe57021edd62
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
24.0MB
MD5f3277ca9f20e3b161350ab2257c8b8c4
SHA1abd6855d0afb26f5112d3d833e679a90ff5a83c6
SHA25601dcaa6997a1b368db280a16f58e57f2d96e1a8b9a6c5abf60f192efde01d8c2
SHA5125675156031cce088fb7f7ecd2e8903c33f8f7a993a8cb0f073b255d74f25781edb1d0a9ac09b7b51c05e692b3158872fc7844d1fee056c3034423ba643153950