Analysis
-
max time kernel
146s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 03:55
Behavioral task
behavioral1
Sample
JaffaCakes118_506201f7ce08505f064fca1d168248be.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_506201f7ce08505f064fca1d168248be.exe
-
Size
142KB
-
MD5
506201f7ce08505f064fca1d168248be
-
SHA1
595ba8a05661b51a0f686cd8612484d8fa140f18
-
SHA256
726d0f704399e9084b6537dcbd1098ba5ba5aca5504627e6a600fee85f259d0f
-
SHA512
746274d369f44b889dfdfff68359558f56dbe24139f10da039bd3472cd833de9b83f6a8b0006c764b34552225e66297a27c90803bcc069389f914be8f9b26df6
-
SSDEEP
3072:nNgpxj1yCtzLMQAXnawUxZ1s6AeLGEfNAs:nNgxj4CtzTAFW1HbNN
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x0000000000425000-memory.dmp family_gh0strat behavioral1/files/0x000b00000001227d-6.dat family_gh0strat behavioral1/memory/2732-14-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat behavioral1/memory/2172-16-0x0000000000400000-0x0000000000425000-memory.dmp family_gh0strat behavioral1/memory/2732-17-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2560 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2732 WinUserMan.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_506201f7ce08505f064fca1d168248be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinUserMan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2732 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 30 PID 2172 wrote to memory of 2732 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 30 PID 2172 wrote to memory of 2732 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 30 PID 2172 wrote to memory of 2732 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 30 PID 2172 wrote to memory of 2560 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 31 PID 2172 wrote to memory of 2560 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 31 PID 2172 wrote to memory of 2560 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 31 PID 2172 wrote to memory of 2560 2172 JaffaCakes118_506201f7ce08505f064fca1d168248be.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_506201f7ce08505f064fca1d168248be.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_506201f7ce08505f064fca1d168248be.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Roaming\Microsoft\WinUserMan.exeC:\Users\Admin\AppData\Roaming\Microsoft\WinUserMan.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5b3549eee40012755a888c8639c55d205
SHA1a61efa5f71afb2e3843630fb0a759b504638523f
SHA2567c49c3642d3740e1175d2f7deb5a66a60a4b713e597954fdf1b447709744f613
SHA5121737a64939dfcac321f334e8be8c46f33ef76ef6a77cf48d233a3977be3691e353aa65d7e6a680c299114096d1ceedaebca5326df05846c8fb56c34aad6d8f74