Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 20:40
Behavioral task
behavioral1
Sample
JaffaCakes118_538cf6a4bc7cf018816b3d8d021926eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_538cf6a4bc7cf018816b3d8d021926eb.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_538cf6a4bc7cf018816b3d8d021926eb.exe
-
Size
123KB
-
MD5
538cf6a4bc7cf018816b3d8d021926eb
-
SHA1
c3ad4bbf651bc822bb1d235192b035b3f77afa5e
-
SHA256
87f4f9b2dd2b1675b98dbf734051e19311abcd91c400b4ee307e3f34e2ab68fd
-
SHA512
40af1a22d865d479f226eebedd7c7a2d8360ea647833e04d5c19effc70a98dbdbeb4b7dd2fe3ff4005f6a0c2d1d65cd729145b4dbbac20baba1f9bc242cb87c7
-
SSDEEP
3072:xTBhn6096QQGEAwsUCHXAUSYOyYNnFLzCqASw17kwmkT:xVhn6096QQxAwtoXbjUFPMSwvN
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/5708-0-0x0000000000400000-0x0000000000420000-memory.dmp family_gh0strat behavioral2/memory/5708-3-0x0000000000400000-0x0000000000420000-memory.dmp family_gh0strat behavioral2/files/0x000b000000023b71-2.dat family_gh0strat behavioral2/memory/1712-5-0x0000000010000000-0x000000001001D000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\userdata.dll" JaffaCakes118_538cf6a4bc7cf018816b3d8d021926eb.exe -
Loads dropped DLL 3 IoCs
pid Process 1712 SVCHOST.EXE 1712 SVCHOST.EXE 1712 SVCHOST.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_538cf6a4bc7cf018816b3d8d021926eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_538cf6a4bc7cf018816b3d8d021926eb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_538cf6a4bc7cf018816b3d8d021926eb.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:5708
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD58e2d081d3cd827b9839622599f2cf2fe
SHA18ad615ad486d61a0635f2f5b5f720ea6e8710f98
SHA256057bed3e667540d03253c1c4dda5c4c6ac65c25306ab805caa280a6d2c63495a
SHA51205de0b31ab8e6c3e3cba98cb9262007c9bf876f0db7bae39e155d66e3c5177434156b223b0ece7240bd934373333361a4db697f18d97e639387a70acd701b120