Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_50946ca3a96ab4371567553dcb83ea02.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_50946ca3a96ab4371567553dcb83ea02.exe
-
Size
388KB
-
MD5
50946ca3a96ab4371567553dcb83ea02
-
SHA1
8cc096b4d8f36f0e923dd7c635c411cb85e1989a
-
SHA256
68983bddcb886f58d8bab418a3626a76fe4d537ec8d4ffd2ac57b7aa30760e7f
-
SHA512
cc2ee4703c39e1074fbf16235d4127839a42ac9a560e8b85f8d677ebf6625fd512bec6317e130d68a286a8df1ebcd3719b1dc6a82cf73a44f021d1b6a2b79617
-
SSDEEP
6144:kAXMWIo33PNN4LBYhI966AGkAjOpoaY7jSTCzA614EIDGLiBkBiQ88F/VhB95o:kJo3/ToBgq6xGJOpqkCJ1bICPv88F97o
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/3476-33-0x0000000000400000-0x00000000004A7000-memory.dmp family_gh0strat behavioral2/memory/3476-55-0x0000000000400000-0x00000000004A7000-memory.dmp family_gh0strat behavioral2/memory/3476-56-0x0000000000400000-0x00000000004A7000-memory.dmp family_gh0strat -
Gh0strat family
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kav.key JaffaCakes118_50946ca3a96ab4371567553dcb83ea02.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_50946ca3a96ab4371567553dcb83ea02.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_50946ca3a96ab4371567553dcb83ea02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz JaffaCakes118_50946ca3a96ab4371567553dcb83ea02.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50946ca3a96ab4371567553dcb83ea02.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50946ca3a96ab4371567553dcb83ea02.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3476