Analysis
-
max time kernel
128s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe
-
Size
210KB
-
MD5
50b53a7a274add1c38128605f02f441b
-
SHA1
41817413cbbc2b82dd542f3ddbf0757f315ec364
-
SHA256
80d1795b1d1917c7e14638aa00893469109bab219848d79630ed3fb237aed0f7
-
SHA512
77be8a24bf75f070512014dee801429668b4cf3d5009f6a4bb9233b4013aeacd0e38f20c79e07916a21450cfbef9f4dac74d79222fd4fd96a8e2b71ab0e3c571
-
SSDEEP
3072:LKdAWCTtDrHwvxiIe91s+n3p/5e8jR0cTs/w+VLXKr6vkvs9R8igyQfgEOBeOB0/:2GGvXoim363/OG58dyQIpXg
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2920-3-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/2920-6-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/2920-5-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat -
Gh0strat family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXF84477E5 = "C:\\Windows\\XXXXXXF84477E5\\svchsot.exe" JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\XXXXXXF84477E5\svchsot.exe JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe File created C:\Windows\XXXXXXF84477E5\JH.BAT JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe File created C:\Windows\XXXXXXF84477E5\svchsot.exe JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2832 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
System Service Discovery 1 TTPs 2 IoCs
Adversaries may try to gather information about registered local system services.
pid Process 2836 net.exe 2780 net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2920 JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe 2920 JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe 2920 JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe 2920 JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2704 2920 JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe 30 PID 2920 wrote to memory of 2704 2920 JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe 30 PID 2920 wrote to memory of 2704 2920 JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe 30 PID 2920 wrote to memory of 2704 2920 JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe 30 PID 2704 wrote to memory of 2692 2704 cmd.exe 32 PID 2704 wrote to memory of 2692 2704 cmd.exe 32 PID 2704 wrote to memory of 2692 2704 cmd.exe 32 PID 2704 wrote to memory of 2692 2704 cmd.exe 32 PID 2704 wrote to memory of 2832 2704 cmd.exe 33 PID 2704 wrote to memory of 2832 2704 cmd.exe 33 PID 2704 wrote to memory of 2832 2704 cmd.exe 33 PID 2704 wrote to memory of 2832 2704 cmd.exe 33 PID 2704 wrote to memory of 2836 2704 cmd.exe 34 PID 2704 wrote to memory of 2836 2704 cmd.exe 34 PID 2704 wrote to memory of 2836 2704 cmd.exe 34 PID 2704 wrote to memory of 2836 2704 cmd.exe 34 PID 2836 wrote to memory of 2780 2836 net.exe 35 PID 2836 wrote to memory of 2780 2836 net.exe 35 PID 2836 wrote to memory of 2780 2836 net.exe 35 PID 2836 wrote to memory of 2780 2836 net.exe 35 PID 2704 wrote to memory of 2940 2704 cmd.exe 36 PID 2704 wrote to memory of 2940 2704 cmd.exe 36 PID 2704 wrote to memory of 2940 2704 cmd.exe 36 PID 2704 wrote to memory of 2940 2704 cmd.exe 36 PID 2704 wrote to memory of 2680 2704 cmd.exe 37 PID 2704 wrote to memory of 2680 2704 cmd.exe 37 PID 2704 wrote to memory of 2680 2704 cmd.exe 37 PID 2704 wrote to memory of 2680 2704 cmd.exe 37 PID 2704 wrote to memory of 2732 2704 cmd.exe 38 PID 2704 wrote to memory of 2732 2704 cmd.exe 38 PID 2704 wrote to memory of 2732 2704 cmd.exe 38 PID 2704 wrote to memory of 2732 2704 cmd.exe 38 PID 2704 wrote to memory of 2192 2704 cmd.exe 39 PID 2704 wrote to memory of 2192 2704 cmd.exe 39 PID 2704 wrote to memory of 2192 2704 cmd.exe 39 PID 2704 wrote to memory of 2192 2704 cmd.exe 39 PID 2704 wrote to memory of 2176 2704 cmd.exe 40 PID 2704 wrote to memory of 2176 2704 cmd.exe 40 PID 2704 wrote to memory of 2176 2704 cmd.exe 40 PID 2704 wrote to memory of 2176 2704 cmd.exe 40 PID 2704 wrote to memory of 2712 2704 cmd.exe 41 PID 2704 wrote to memory of 2712 2704 cmd.exe 41 PID 2704 wrote to memory of 2712 2704 cmd.exe 41 PID 2704 wrote to memory of 2712 2704 cmd.exe 41 PID 2704 wrote to memory of 268 2704 cmd.exe 42 PID 2704 wrote to memory of 268 2704 cmd.exe 42 PID 2704 wrote to memory of 268 2704 cmd.exe 42 PID 2704 wrote to memory of 268 2704 cmd.exe 42 PID 2704 wrote to memory of 568 2704 cmd.exe 43 PID 2704 wrote to memory of 568 2704 cmd.exe 43 PID 2704 wrote to memory of 568 2704 cmd.exe 43 PID 2704 wrote to memory of 568 2704 cmd.exe 43 PID 2704 wrote to memory of 2908 2704 cmd.exe 44 PID 2704 wrote to memory of 2908 2704 cmd.exe 44 PID 2704 wrote to memory of 2908 2704 cmd.exe 44 PID 2704 wrote to memory of 2908 2704 cmd.exe 44 PID 2704 wrote to memory of 2904 2704 cmd.exe 45 PID 2704 wrote to memory of 2904 2704 cmd.exe 45 PID 2704 wrote to memory of 2904 2704 cmd.exe 45 PID 2704 wrote to memory of 2904 2704 cmd.exe 45 PID 2704 wrote to memory of 2448 2704 cmd.exe 46 PID 2704 wrote to memory of 2448 2704 cmd.exe 46 PID 2704 wrote to memory of 2448 2704 cmd.exe 46 PID 2704 wrote to memory of 2448 2704 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50b53a7a274add1c38128605f02f441b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\XXXXXXF84477E5\JH.BAT2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵
- System Location Discovery: System Language Discovery
- System Service Discovery
PID:2780
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:268
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:568
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:664
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1888
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXXF84477E5\svchsot.exe3⤵
- System Location Discovery: System Language Discovery
PID:1816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561c6f67365f0b2cde7fbbd681ca5bcb7
SHA1baac92279bf7900cffc7029a254b484c605c0e68
SHA256814f7026db56f9644173afde10b623b69729e22e918a17c750d0ac8b1cf3ab05
SHA512135f85b00f793d22a2a80078957989cb7b8b99dd9a154a62a18f17a078d60d83489b7829f0e1bb382b500de8b269b5634ad51e8e8d6cf11f8b64fd28e0ed39b7