Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 11:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_51de17ec14afffee48d414ca4b0cce2b.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_51de17ec14afffee48d414ca4b0cce2b.exe
-
Size
420KB
-
MD5
51de17ec14afffee48d414ca4b0cce2b
-
SHA1
edb30c7bcf473157d85e3b4028f7e7891a82a531
-
SHA256
860a88ed560387090f024fdd3a706472ddac7260b492aa10495711a12a003e89
-
SHA512
8923e981b30102395518427e3ac3c4a18b7fdaac1dd176af93adf7f237f2eccc21f4d9557075d4b60e3a019308436c47128328564d448bd19e2a69604fdd3455
-
SSDEEP
12288:8oxnd1/Oy5pSHINrWNTxcBNOYRlQJyQiNyp+YIhVk:Vd12IE2gYR7Q2YILk
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/memory/1752-3-0x0000000000400000-0x000000000055C000-memory.dmp family_gh0strat behavioral1/memory/1752-6-0x0000000000400000-0x000000000055C000-memory.dmp family_gh0strat behavioral1/memory/1752-7-0x0000000000400000-0x000000000055C000-memory.dmp family_gh0strat behavioral1/memory/1752-8-0x0000000000400000-0x000000000055C000-memory.dmp family_gh0strat behavioral1/memory/1752-12-0x0000000000400000-0x000000000055C000-memory.dmp family_gh0strat behavioral1/memory/1752-15-0x0000000000400000-0x000000000055C000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_51de17ec14afffee48d414ca4b0cce2b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1752 JaffaCakes118_51de17ec14afffee48d414ca4b0cce2b.exe