Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 19:15
Behavioral task
behavioral1
Sample
JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe
-
Size
156KB
-
MD5
5348f38d5da6d941fa7ace5eddb245d0
-
SHA1
fa6c23789e16be41eee183dc6199ff53a42aca8b
-
SHA256
3c13fdfc8f840fcc62c2310fce7a2e4e51397ac00e6bd98ce24f972530ef7272
-
SHA512
1daae845424a6908cefe022053cc4fab0bba2058c50dfe8e804911fcc6bfa4cf4149c13f4938799560fa5ca00cacb1606f83d8e3156eec8cb4eabfb071a09292
-
SSDEEP
3072:aCig2TRyeUf+QPVcr6enHz82vaQW4x65OaJ0sJj52X:acOO+JOeJDWY8VJ0sJjcX
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1844-10-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/memory/1844-23-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 1656 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1844 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Remote Serviceid.dll.temp.tlb rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1844 rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\1.txt JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe File created C:\Program Files (x86)\1.bat rundll32.exe File opened for modification C:\Program Files (x86)\1.bat rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2852 wrote to memory of 1844 2852 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 30 PID 2852 wrote to memory of 1844 2852 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 30 PID 2852 wrote to memory of 1844 2852 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 30 PID 2852 wrote to memory of 1844 2852 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 30 PID 2852 wrote to memory of 1844 2852 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 30 PID 2852 wrote to memory of 1844 2852 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 30 PID 2852 wrote to memory of 1844 2852 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 30 PID 1844 wrote to memory of 1656 1844 rundll32.exe 31 PID 1844 wrote to memory of 1656 1844 rundll32.exe 31 PID 1844 wrote to memory of 1656 1844 rundll32.exe 31 PID 1844 wrote to memory of 1656 1844 rundll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\\wincap.ai" MyRun2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\1.bat""3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD56d27747cc465bb829cf57b891b185215
SHA138c6547074b8394ac90de474a8f803cd2a67bf3e
SHA2569aa7c0e75e86f4b1f866139f15d38ea528953e141b714f7db67fc422a7b50d72
SHA5123eb0fdf205a24929e1089e5cc74be21a245e013c816b8bc61119224f3cf6085e3a5388c7610eb9e5c05169f87e01ee7739856c5d4437da55bbfa882a9867c2cb