Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 20:49
Behavioral task
behavioral1
Sample
JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe
-
Size
163KB
-
MD5
5392cfa1d3ebf19311baedc1e5d9bd36
-
SHA1
871b8c8172c95b64bfe80a2aa459459eaa3c2ab1
-
SHA256
243d5dac34cc985729c8623cfce9e95b667d2642d7f6f930469c04a1e6386242
-
SHA512
e376eb83ffb283cec17b1f70dabcb3ecff1bddab11d8e4b5da0b8377f8cb01193c366ce2b2584eb6605dd9e081cd6357ade97ce0902d9bd57e1b81d941b9387c
-
SSDEEP
3072:dxhXDNHBbWKRpvv70d/pPHWH43NjCa3Aal4b8ceHyhosXln5I3iv:dx9DHbWK3vv7opfWHgUaQfb8n85IG
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/4644-0-0x0000000000400000-0x000000000042B000-memory.dmp family_gh0strat behavioral2/files/0x000a000000023c5c-3.dat family_gh0strat behavioral2/memory/4644-4-0x0000000000400000-0x000000000042B000-memory.dmp family_gh0strat behavioral2/memory/2136-6-0x0000000010000000-0x0000000010021000-memory.dmp family_gh0strat behavioral2/memory/2136-7-0x0000000010000000-0x0000000010021000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\winrenms0x0\Parameters\ServiceDll = "C:\\Documents and Settings\\Local\\ntuser.dll" JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 5 IoCs
pid Process 1076 taskkill.exe 4376 taskkill.exe 3540 taskkill.exe 1644 taskkill.exe 3520 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3520 taskkill.exe Token: SeDebugPrivilege 1076 taskkill.exe Token: SeDebugPrivilege 2136 svchost.exe Token: SeDebugPrivilege 3540 taskkill.exe Token: SeDebugPrivilege 4376 taskkill.exe Token: SeDebugPrivilege 1644 taskkill.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4644 wrote to memory of 1076 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 84 PID 4644 wrote to memory of 1076 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 84 PID 4644 wrote to memory of 1076 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 84 PID 4644 wrote to memory of 3520 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 85 PID 4644 wrote to memory of 3520 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 85 PID 4644 wrote to memory of 3520 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 85 PID 4644 wrote to memory of 1644 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 86 PID 4644 wrote to memory of 1644 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 86 PID 4644 wrote to memory of 1644 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 86 PID 4644 wrote to memory of 3540 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 87 PID 4644 wrote to memory of 3540 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 87 PID 4644 wrote to memory of 3540 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 87 PID 4644 wrote to memory of 4376 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 88 PID 4644 wrote to memory of 4376 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 88 PID 4644 wrote to memory of 4376 4644 JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe 88 PID 2136 wrote to memory of 396 2136 svchost.exe 95 PID 2136 wrote to memory of 396 2136 svchost.exe 95 PID 2136 wrote to memory of 396 2136 svchost.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5392cfa1d3ebf19311baedc1e5d9bd36.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im KSafeTray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im KSafeTray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im KSafeTray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im KSafeTray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im kswebshield.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\SysWOW64\svchost.exe,main2⤵
- System Location Discovery: System Language Discovery
PID:396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD56e2ac653458e7f09f1820c9e1d9ac444
SHA15285fd97c74789f3d70e5401a3fc143f5f23918e
SHA256cfcb1120a3def2182caf0bac92b2b94cf9df9c7628e56a020fe08d0882caef6c
SHA512194e312cec9f597e9b02339635ec9c616e18c9332b73ac08f221d9d73983c50f14b9d5a48ca1bfc38b885f743c99e431c8e73401fb5ce24dcc268cd986128c7c