Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe
-
Size
5.0MB
-
MD5
5392164e0cb5045847c4ee9cff4813f6
-
SHA1
20f55805079a0c35ce493589335fce990c8e708a
-
SHA256
bea5b55cdef955ac7b8a9fead52ddc7f659fa3470c470fd36e769d1b57c5234e
-
SHA512
82f0cf0a85ec7164dbcd442c33e969186e8ddb179707b053fb0ac91f09891bd2196f9e8499cd3ab903a3262f7f334a82916b150b18dab29c84c7d04fd6c4987a
-
SSDEEP
49152:smv3GY5fa22GFbn0iDenAPpv//e2zzoM/IFnLA5:s0W2SLGFD0i0UPe2N/YLA5
Malware Config
Signatures
-
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2764-42-0x0000000000400000-0x000000000097D000-memory.dmp family_gh0strat behavioral1/files/0x00090000000186c3-45.dat family_gh0strat behavioral1/memory/2764-47-0x0000000000400000-0x000000000097D000-memory.dmp family_gh0strat behavioral1/memory/2764-48-0x0000000000400000-0x000000000097D000-memory.dmp family_gh0strat behavioral1/memory/2764-49-0x0000000000400000-0x000000000097D000-memory.dmp family_gh0strat behavioral1/memory/2764-50-0x0000000000400000-0x000000000097D000-memory.dmp family_gh0strat behavioral1/memory/2764-51-0x0000000000400000-0x000000000097D000-memory.dmp family_gh0strat behavioral1/memory/2764-53-0x0000000000400000-0x000000000097D000-memory.dmp family_gh0strat behavioral1/memory/2620-56-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gswhpgqvmq -
Deletes itself 1 IoCs
pid Process 2764 gswhpgqvmq -
Executes dropped EXE 1 IoCs
pid Process 2764 gswhpgqvmq -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine gswhpgqvmq -
Loads dropped DLL 3 IoCs
pid Process 1612 JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe 1612 JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe 2620 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\nnsuvduuwr svchost.exe File created C:\Windows\SysWOW64\nvhnegwskn svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1612 JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe 2764 gswhpgqvmq -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gswhpgqvmq Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1612 JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe 2764 gswhpgqvmq 2764 gswhpgqvmq 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 2764 gswhpgqvmq Token: SeBackupPrivilege 2764 gswhpgqvmq Token: SeBackupPrivilege 2764 gswhpgqvmq Token: SeRestorePrivilege 2764 gswhpgqvmq Token: SeBackupPrivilege 2620 svchost.exe Token: SeRestorePrivilege 2620 svchost.exe Token: SeBackupPrivilege 2620 svchost.exe Token: SeBackupPrivilege 2620 svchost.exe Token: SeSecurityPrivilege 2620 svchost.exe Token: SeSecurityPrivilege 2620 svchost.exe Token: SeBackupPrivilege 2620 svchost.exe Token: SeBackupPrivilege 2620 svchost.exe Token: SeSecurityPrivilege 2620 svchost.exe Token: SeBackupPrivilege 2620 svchost.exe Token: SeBackupPrivilege 2620 svchost.exe Token: SeSecurityPrivilege 2620 svchost.exe Token: SeBackupPrivilege 2620 svchost.exe Token: SeRestorePrivilege 2620 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2764 1612 JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe 30 PID 1612 wrote to memory of 2764 1612 JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe 30 PID 1612 wrote to memory of 2764 1612 JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe 30 PID 1612 wrote to memory of 2764 1612 JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
\??\c:\users\admin\appdata\local\gswhpgqvmq"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5392164e0cb5045847c4ee9cff4813f6.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_5392164e0cb5045847c4ee9cff4813f6.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Deletes itself
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23.0MB
MD5ac90456078b5733dc17175f16b2b0977
SHA123a7a45453e9052d09288c519926614e476785ae
SHA2566eaf4184ed96621356dfe9e6117eb30f19af3bd6222fa2a3b2493ad2a415f845
SHA51244fb512db7a6de9d9dd6325770c19941675d8243822458ec9db12c2d4ff46e9625298a8c3c4610b3abb55dfdd7232e55e6fb1d02eb7c657e647c95b2ab30b6ff
-
Filesize
19.1MB
MD5884485fb8e952a494c8d59f987a57c1c
SHA154bbe2bc704595fed18bb5d25f88158b9334db8e
SHA256607746097e1ee7427e8858cadbfbdbed95d6295ed364d2dc9d55521a568aef15
SHA512f494c73f3c6ed15bb65cb011f8e75d0c96183d0698147355cbc81986028eeab1270737245e09dbcc3d90cbee591f0e48e6763c082016ba5bd761baa6eb3eef62