Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_569950bac39e02139f59232e4342bd72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_569950bac39e02139f59232e4342bd72.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_569950bac39e02139f59232e4342bd72.exe
-
Size
338KB
-
MD5
569950bac39e02139f59232e4342bd72
-
SHA1
5fe8348ba8e33832c1d32c440ce6bcd5ca2d81a3
-
SHA256
2eaffee2df904fe4f9e8275adba88b6b9c79833cd1c56f2efd730e49994ea3c1
-
SHA512
2ab32d6807279921fd2c3f73d3dd7ed92fd1bdb1823c89e8065c7934b224e613daf7f82f39f457708c7f7ce7dd905f0166c16dfb61ca7d5d009ad857af3a0483
-
SSDEEP
6144:kDOKu03Vjuy4nDWgRAkPf2GQn8xID0DMFChkYkYZeTx1xirVOK/Apf8bZ9oWOQ:8ju0FKvR3Pf2GLxe0Dv7jZw1ucEN9oZQ
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral2/memory/1464-6-0x0000000000400000-0x0000000000486000-memory.dmp family_gh0strat behavioral2/memory/3040-28-0x0000000000400000-0x0000000000486000-memory.dmp family_gh0strat behavioral2/files/0x0004000000022b3b-33.dat family_gh0strat behavioral2/memory/3040-29-0x0000000000400000-0x0000000000486000-memory.dmp family_gh0strat behavioral2/memory/3040-25-0x0000000000400000-0x0000000000486000-memory.dmp family_gh0strat behavioral2/memory/1464-19-0x0000000000400000-0x0000000000486000-memory.dmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76CD49E5-CDCC-44a7-8DBC-A651032FE409} JaffaCakes118_569950bac39e02139f59232e4342bd72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76CD49E5-CDCC-44a7-8DBC-A651032FE409}\stubpath = "C:\\Windows\\system32\\insezthji.exe" JaffaCakes118_569950bac39e02139f59232e4342bd72.exe -
Executes dropped EXE 1 IoCs
pid Process 3040 insezthji.exe -
Loads dropped DLL 1 IoCs
pid Process 4812 userinit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\insezthji.exe JaffaCakes118_569950bac39e02139f59232e4342bd72.exe File opened for modification C:\Windows\SysWOW64\insezthji.exe_lang.ini JaffaCakes118_569950bac39e02139f59232e4342bd72.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_569950bac39e02139f59232e4342bd72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insezthji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1464 JaffaCakes118_569950bac39e02139f59232e4342bd72.exe 1464 JaffaCakes118_569950bac39e02139f59232e4342bd72.exe 3040 insezthji.exe 3040 insezthji.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1464 JaffaCakes118_569950bac39e02139f59232e4342bd72.exe Token: SeDebugPrivilege 3040 insezthji.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1464 wrote to memory of 3040 1464 JaffaCakes118_569950bac39e02139f59232e4342bd72.exe 85 PID 1464 wrote to memory of 3040 1464 JaffaCakes118_569950bac39e02139f59232e4342bd72.exe 85 PID 1464 wrote to memory of 3040 1464 JaffaCakes118_569950bac39e02139f59232e4342bd72.exe 85 PID 3040 wrote to memory of 4812 3040 insezthji.exe 86 PID 3040 wrote to memory of 4812 3040 insezthji.exe 86 PID 3040 wrote to memory of 4812 3040 insezthji.exe 86 PID 3040 wrote to memory of 4812 3040 insezthji.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_569950bac39e02139f59232e4342bd72.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_569950bac39e02139f59232e4342bd72.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\userinit.exeuserinit.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5a8279606ab507648d49c750df7ce270a
SHA1505384b8dc287dbca20ba6d9db506bddbc0b3923
SHA2565d7393bbe0f66c089371c40a7fcc554a4bd130838db35825659df703eef8400d
SHA5125261c109df80b0f3198ecb7d60e9fe18a8b58762266cb80a442c8f00176a12fa1a414d711913ed12d6b12fb1782e79711353e611bf173426decc2c4eb0bb7855
-
Filesize
338KB
MD5f5e0862bddc357383c5a6907b4e048cd
SHA19e7459b8e5df5d23361bcac07d162972acf99d9c
SHA256adc6129112b429c02f50aec4dd5787781adf5ce91b3b39212891f783790dc3cf
SHA51290aeca9251f183e455c4ac240571b72f37e66c0721b49785d1185196aaeb0794084012c7cb515cdb7dc46edc89f3a8f98d42325d96b5337e5810ce76cdb3a00a