Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 19:15
Behavioral task
behavioral1
Sample
JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe
-
Size
156KB
-
MD5
5348f38d5da6d941fa7ace5eddb245d0
-
SHA1
fa6c23789e16be41eee183dc6199ff53a42aca8b
-
SHA256
3c13fdfc8f840fcc62c2310fce7a2e4e51397ac00e6bd98ce24f972530ef7272
-
SHA512
1daae845424a6908cefe022053cc4fab0bba2058c50dfe8e804911fcc6bfa4cf4149c13f4938799560fa5ca00cacb1606f83d8e3156eec8cb4eabfb071a09292
-
SSDEEP
3072:aCig2TRyeUf+QPVcr6enHz82vaQW4x65OaJ0sJj52X:acOO+JOeJDWY8VJ0sJjcX
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/2024-12-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral2/memory/2024-20-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat -
Gh0strat family
-
Loads dropped DLL 1 IoCs
pid Process 2024 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Remote Serviceid.dll.temp.tlb rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2024 rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\1.bat rundll32.exe File opened for modification C:\Program Files (x86)\1.bat rundll32.exe File opened for modification C:\Program Files (x86)\1.txt JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 700 wrote to memory of 2024 700 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 87 PID 700 wrote to memory of 2024 700 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 87 PID 700 wrote to memory of 2024 700 JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe 87 PID 2024 wrote to memory of 2536 2024 rundll32.exe 88 PID 2024 wrote to memory of 2536 2024 rundll32.exe 88 PID 2024 wrote to memory of 2536 2024 rundll32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5348f38d5da6d941fa7ace5eddb245d0.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\\wincap.ai" MyRun2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\1.bat""3⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD56d27747cc465bb829cf57b891b185215
SHA138c6547074b8394ac90de474a8f803cd2a67bf3e
SHA2569aa7c0e75e86f4b1f866139f15d38ea528953e141b714f7db67fc422a7b50d72
SHA5123eb0fdf205a24929e1089e5cc74be21a245e013c816b8bc61119224f3cf6085e3a5388c7610eb9e5c05169f87e01ee7739856c5d4437da55bbfa882a9867c2cb