Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 05:22
Behavioral task
behavioral1
Sample
JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe
-
Size
125KB
-
MD5
50ae7ef897a0f22391010450c33e5283
-
SHA1
213992af1eeea4361d9dbdded01faee3d0a30a7b
-
SHA256
70adde8db316d8e62f0f04537083641d0d7a257c6b19e1fc9bae0c1a9635b8d1
-
SHA512
994c70d3f3ec51851827b4cb1c3b103ef85c9835fa574ddbb5440c8329bf06972623c539a55d8a8616d36d97aa02820bcc7c17f417fbbc23eba912e81d0a9489
-
SSDEEP
3072:zS3i7bVEnOQ5UP6hKRXuS6S9L3e2ta2OMdj3Kx8o1:zSKVEnOQ5UyhZK973aodj6d
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000e0000000193be-2.dat family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360svc\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\QQpinyin.dll" JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe -
Deletes itself 1 IoCs
pid Process 2676 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2676 svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3068 JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe 3068 JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50ae7ef897a0f22391010450c33e5283.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5ab8b3818c3fcbdde54d5ae2cf8d58340
SHA15e610903f2f9e6ce2c22e84dc578a237e42b81ca
SHA256537d1e779763033ae35bd4ee535791b5f26230b2ff2a9dfa30fae56e463a9f36
SHA5120948af4a28f8a7013bd6ef447d28e0675570ca0b7f13caf8f32b79f035aedc30e343ae4ee551f75cfe5bc94a2b403f0a47a7e270c8a77331042ca33a41c3d276