Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 08:01
Behavioral task
behavioral1
Sample
JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe
-
Size
130KB
-
MD5
513c615166679a5285ca67ea46f3a0ad
-
SHA1
1ca4d7b9d50cc78c633a716b5e7826a98cbfc831
-
SHA256
9fcbcf805569114aac3fa61cd6e19e51fb7abb4c8eaabc335969a3ff8127e940
-
SHA512
5a4267b815089e03776087cf0fb4d034e7fdfaab66c272ef60e7f3c82e41a41c4b5c01dfce288915bd2a166d6ee2faacaf5a1d0e675115e14d113dcf1b540235
-
SSDEEP
3072:n2kiTz6S/cO614R51OfUTiWUmdsONtAqGEefz:nLiTz6S/x6c17NUmKoCqJQz
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4076-0-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat behavioral2/memory/4076-9-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat -
Gh0strat family
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\MyInformations.ini JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe -
Kills process with taskkill 1 IoCs
pid Process 4020 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4020 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 4020 4076 JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe 84 PID 4076 wrote to memory of 4020 4076 JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe 84 PID 4076 wrote to memory of 4020 4076 JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_513c615166679a5285ca67ea46f3a0ad.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im ZhuDongFangYu.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
398B
MD5a3394b5a650ae439be600668e073151e
SHA1ced640318e92b543e0317eb22e3131df7359811b
SHA2561f43975bbd11b5ce32debd89ff23ac8f28fab85bb47bf5f8f152337c30ccab41
SHA512340d10c4fb6232d5dced2ab7d5f675f438d49ded939e46dd2389b7427f82b023fb4cdf55e144e5b025f5e3b4b64bd8b0fc786e53c04f8d7b08b788407a2bdd58