Analysis
-
max time kernel
93s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 13:30
Behavioral task
behavioral1
Sample
JaffaCakes118_5688f5c8046aaa5b9c4f0e1d71e6e78b.dll
Resource
win7-20240729-en
7 signatures
150 seconds
General
-
Target
JaffaCakes118_5688f5c8046aaa5b9c4f0e1d71e6e78b.dll
-
Size
148KB
-
MD5
5688f5c8046aaa5b9c4f0e1d71e6e78b
-
SHA1
13cb3470c8469063c54fc763960cc97d73a8ffcf
-
SHA256
2f0d3ddfc455c78def12192e6b9708562a2640a4e19096411552d2c1ab2222f2
-
SHA512
2019900d341d5256a9fbb74c2652e2100266b743192ad568258e98f16a77b147a7b13f0a8670a9998edf09889fc9aa024e66356baa2a6f79d6a91907c07dd279
-
SSDEEP
3072:dcOqt/4opDQkdDIdlyA06726bwtTBftIihnk:dcOqnJcJ06q6bwtTBl3hn
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2340-0-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat behavioral1/memory/2340-2-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat -
Gh0strat family
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regsvr32.exe.txt regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2452 2340 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2340 1940 regsvr32.exe 30 PID 1940 wrote to memory of 2340 1940 regsvr32.exe 30 PID 1940 wrote to memory of 2340 1940 regsvr32.exe 30 PID 1940 wrote to memory of 2340 1940 regsvr32.exe 30 PID 1940 wrote to memory of 2340 1940 regsvr32.exe 30 PID 1940 wrote to memory of 2340 1940 regsvr32.exe 30 PID 1940 wrote to memory of 2340 1940 regsvr32.exe 30 PID 2340 wrote to memory of 2452 2340 regsvr32.exe 31 PID 2340 wrote to memory of 2452 2340 regsvr32.exe 31 PID 2340 wrote to memory of 2452 2340 regsvr32.exe 31 PID 2340 wrote to memory of 2452 2340 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5688f5c8046aaa5b9c4f0e1d71e6e78b.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5688f5c8046aaa5b9c4f0e1d71e6e78b.dll2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 3083⤵
- Program crash
PID:2452
-
-