Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe
-
Size
150KB
-
MD5
53158a67f720dadfbea207ae50aaf9fe
-
SHA1
00d1e2b28f740016f1c8893f01c448afcb4f752d
-
SHA256
e44881402128927dbf7de2101600303b1f086d7f2e2a08940868cccdefe5fbf5
-
SHA512
d1aaffa4c5c8b71dd3a77c4b0ce15c76c1803d8a1acba706a6dfa707b3449448f227caefb6cc180e2b81cf9527881ebcb93c02a7639984112e476e0eebfb5f4a
-
SSDEEP
3072:QaPwiR0gEGSd9GAYnnRdHN7nvCRSc9n39ooTID7jsXTcLd2jr:QwwiRCLGpnDN7KRSQn39oyq7HgP
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1428-17-0x0000000000400000-0x0000000000430000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2720 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1428 AF81.tmp 1344 inlCDBD.tmp -
Loads dropped DLL 3 IoCs
pid Process 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 2924 cmd.exe 2924 cmd.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\loader.dll AF81.tmp File created C:\Program Files\Common Files\lanmao.dll AF81.tmp -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\f76ce9a.msi msiexec.exe File created C:\Windows\Installer\f76ce95.msi msiexec.exe File created C:\Windows\Installer\f76ce98.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\Installer\f76ce98.ipi msiexec.exe File created C:\WINDOWS\vbcfg.ini AF81.tmp File opened for modification C:\Windows\Installer\f76ce95.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID115.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AF81.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlCDBD.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 2860 msiexec.exe 2860 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2252 msiexec.exe Token: SeIncreaseQuotaPrivilege 2252 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeSecurityPrivilege 2860 msiexec.exe Token: SeCreateTokenPrivilege 2252 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2252 msiexec.exe Token: SeLockMemoryPrivilege 2252 msiexec.exe Token: SeIncreaseQuotaPrivilege 2252 msiexec.exe Token: SeMachineAccountPrivilege 2252 msiexec.exe Token: SeTcbPrivilege 2252 msiexec.exe Token: SeSecurityPrivilege 2252 msiexec.exe Token: SeTakeOwnershipPrivilege 2252 msiexec.exe Token: SeLoadDriverPrivilege 2252 msiexec.exe Token: SeSystemProfilePrivilege 2252 msiexec.exe Token: SeSystemtimePrivilege 2252 msiexec.exe Token: SeProfSingleProcessPrivilege 2252 msiexec.exe Token: SeIncBasePriorityPrivilege 2252 msiexec.exe Token: SeCreatePagefilePrivilege 2252 msiexec.exe Token: SeCreatePermanentPrivilege 2252 msiexec.exe Token: SeBackupPrivilege 2252 msiexec.exe Token: SeRestorePrivilege 2252 msiexec.exe Token: SeShutdownPrivilege 2252 msiexec.exe Token: SeDebugPrivilege 2252 msiexec.exe Token: SeAuditPrivilege 2252 msiexec.exe Token: SeSystemEnvironmentPrivilege 2252 msiexec.exe Token: SeChangeNotifyPrivilege 2252 msiexec.exe Token: SeRemoteShutdownPrivilege 2252 msiexec.exe Token: SeUndockPrivilege 2252 msiexec.exe Token: SeSyncAgentPrivilege 2252 msiexec.exe Token: SeEnableDelegationPrivilege 2252 msiexec.exe Token: SeManageVolumePrivilege 2252 msiexec.exe Token: SeImpersonatePrivilege 2252 msiexec.exe Token: SeCreateGlobalPrivilege 2252 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeIncBasePriorityPrivilege 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe Token: SeTakeOwnershipPrivilege 2860 msiexec.exe Token: SeRestorePrivilege 2860 msiexec.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1428 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 30 PID 2596 wrote to memory of 1428 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 30 PID 2596 wrote to memory of 1428 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 30 PID 2596 wrote to memory of 1428 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 30 PID 2596 wrote to memory of 1428 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 30 PID 2596 wrote to memory of 1428 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 30 PID 2596 wrote to memory of 1428 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 30 PID 2596 wrote to memory of 2252 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 32 PID 2596 wrote to memory of 2252 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 32 PID 2596 wrote to memory of 2252 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 32 PID 2596 wrote to memory of 2252 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 32 PID 2596 wrote to memory of 2252 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 32 PID 2596 wrote to memory of 2252 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 32 PID 2596 wrote to memory of 2252 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 32 PID 2596 wrote to memory of 2924 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 34 PID 2596 wrote to memory of 2924 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 34 PID 2596 wrote to memory of 2924 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 34 PID 2596 wrote to memory of 2924 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 34 PID 2596 wrote to memory of 2480 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 36 PID 2596 wrote to memory of 2480 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 36 PID 2596 wrote to memory of 2480 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 36 PID 2596 wrote to memory of 2480 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 36 PID 2596 wrote to memory of 2720 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 38 PID 2596 wrote to memory of 2720 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 38 PID 2596 wrote to memory of 2720 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 38 PID 2596 wrote to memory of 2720 2596 JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe 38 PID 2480 wrote to memory of 2728 2480 cmd.exe 40 PID 2480 wrote to memory of 2728 2480 cmd.exe 40 PID 2480 wrote to memory of 2728 2480 cmd.exe 40 PID 2480 wrote to memory of 2728 2480 cmd.exe 40 PID 2860 wrote to memory of 2956 2860 msiexec.exe 41 PID 2860 wrote to memory of 2956 2860 msiexec.exe 41 PID 2860 wrote to memory of 2956 2860 msiexec.exe 41 PID 2860 wrote to memory of 2956 2860 msiexec.exe 41 PID 2860 wrote to memory of 2956 2860 msiexec.exe 41 PID 2860 wrote to memory of 2956 2860 msiexec.exe 41 PID 2860 wrote to memory of 2956 2860 msiexec.exe 41 PID 2924 wrote to memory of 1344 2924 cmd.exe 42 PID 2924 wrote to memory of 1344 2924 cmd.exe 42 PID 2924 wrote to memory of 1344 2924 cmd.exe 42 PID 2924 wrote to memory of 1344 2924 cmd.exe 42 PID 1344 wrote to memory of 848 1344 inlCDBD.tmp 44 PID 1344 wrote to memory of 848 1344 inlCDBD.tmp 44 PID 1344 wrote to memory of 848 1344 inlCDBD.tmp 44 PID 1344 wrote to memory of 848 1344 inlCDBD.tmp 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53158a67f720dadfbea207ae50aaf9fe.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\AF81.tmpC:\Users\Admin\AppData\Roaming\AF81.tmp2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\INSCAD~1.INI /quiet2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\inlCDBD.tmpC:\Users\Admin\AppData\Local\Temp\inlCDBD.tmp cdf1912.tmp3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlCDBD.tmp > nul4⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56B2CEC9F5C0C1F4AD22862971DCDE632⤵
- System Location Discovery: System Language Discovery
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD559d087673c4e0ca9034864313b40c4c4
SHA19014ea415b0176b7555c8bd4148ea1fceb712bdc
SHA25669124fe3d7959ba1b4e5e6ad246b69846c885cb1d880886d68ef33c94aa81386
SHA512ee5420cb2dc84929330b7ccfcb7c6722c428c8c941207b023e9fc801c797caa3d93bfe6545cea99b491a40715bf40c370df36f1d0d1a5860399e0bb06e26e37a
-
Filesize
66KB
MD5c518ae54a41d1ef43c40a039947515ee
SHA1c0268c98d183aa5f8d999a2188bdfbcf07b7b0c3
SHA256d9c54b8091e6c6ce9a8df0a1c5a1772cad00f949768ba98b155317f6abfa443e
SHA5123521404419adcfa9f6a154a6caff88f8f0f0555d6a3e52c6fe48e14b57699407ab7496ec917fde228b257b135865323e8d2cf8d46f3ace0ff186c9f14e467d78
-
Filesize
766B
MD5b69d002455f1a5a100e717a6a84ff991
SHA13a99b22845afb2132300095d84534e65823e678d
SHA256c05465e73465c2d6addc7514ad50b517675ce26bfb1a4cad3d3b64b617940934
SHA5121f2e36f1e8c6f66ba746a3450a9f5c07f300bff4682e32344541596b0bdae7e3f443f3e25deaa7936195c48642f9268e3a626a4018772417ce48d26e4f9d1505
-
Filesize
57B
MD55f41d531dea073e26b0a9a6216061b78
SHA1df228a92f528212da12939d43b8d073c225a791d
SHA256d9f3db0e9be9820f14c9d527a1576a4425fafccac603108bbb0f03ed7e7dff7e
SHA51293584171592fe6a47fed2ba2ff02509ccd61cb138f31eca01ed47125f38cceaf18966ceb9af772ff766cd62f3ba3db585461fd272955787c7f345dc22c0b2f52
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0