Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 08:01

General

  • Target

    JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe

  • Size

    130KB

  • MD5

    513c615166679a5285ca67ea46f3a0ad

  • SHA1

    1ca4d7b9d50cc78c633a716b5e7826a98cbfc831

  • SHA256

    9fcbcf805569114aac3fa61cd6e19e51fb7abb4c8eaabc335969a3ff8127e940

  • SHA512

    5a4267b815089e03776087cf0fb4d034e7fdfaab66c272ef60e7f3c82e41a41c4b5c01dfce288915bd2a166d6ee2faacaf5a1d0e675115e14d113dcf1b540235

  • SSDEEP

    3072:n2kiTz6S/cO614R51OfUTiWUmdsONtAqGEefz:nLiTz6S/x6c17NUmKoCqJQz

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /t /im ZhuDongFangYu.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\MyInformations.ini

    Filesize

    398B

    MD5

    a3394b5a650ae439be600668e073151e

    SHA1

    ced640318e92b543e0317eb22e3131df7359811b

    SHA256

    1f43975bbd11b5ce32debd89ff23ac8f28fab85bb47bf5f8f152337c30ccab41

    SHA512

    340d10c4fb6232d5dced2ab7d5f675f438d49ded939e46dd2389b7427f82b023fb4cdf55e144e5b025f5e3b4b64bd8b0fc786e53c04f8d7b08b788407a2bdd58

  • memory/4076-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/4076-9-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB