Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 19:41
Behavioral task
behavioral1
Sample
JaffaCakes118_57757281882880b9fa595c6d868b8461.exe
Resource
win7-20250207-en
General
-
Target
JaffaCakes118_57757281882880b9fa595c6d868b8461.exe
-
Size
123KB
-
MD5
57757281882880b9fa595c6d868b8461
-
SHA1
c55bc0bc06715ddd82a92242c37f747ccc6c9b3a
-
SHA256
38f60df79fb818f0b4c7335fa328c8fb5f5ea87134304a60350c0feba5318553
-
SHA512
e97ad4399794e3ba727dc7308fa904bd270aed51a1f704133c076c1bd8d3357c2313c25de1ab9cd42b16a954b71b18fe797f261d0e7d18ab0ce5eae14049446e
-
SSDEEP
3072:p84f6OK9TubYGHqdKpl/gy2F/nN82C2UJvXHCcgqK6Hw:pFf6O0TubZHqsPetN/AJvS3
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2988-0-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat behavioral1/memory/860-5-0x0000000010000000-0x000000001001D000-memory.dmp family_gh0strat behavioral1/files/0x0008000000015d84-4.dat family_gh0strat behavioral1/memory/2988-3-0x0000000000400000-0x0000000000421000-memory.dmp family_gh0strat behavioral1/memory/860-6-0x0000000010000000-0x000000001001D000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360svc\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\ntuser.dll" JaffaCakes118_57757281882880b9fa595c6d868b8461.exe -
Deletes itself 1 IoCs
pid Process 860 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 860 svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_57757281882880b9fa595c6d868b8461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2988 JaffaCakes118_57757281882880b9fa595c6d868b8461.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_57757281882880b9fa595c6d868b8461.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_57757281882880b9fa595c6d868b8461.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD586a5039b0e432cf4e65445ac115a4109
SHA107eae36e2c56e112581402eb3f899a4a1244a627
SHA256106952393b6c1c0c62d86d2828251e7498110646aa07745bbb681cc029ff0f3b
SHA512daca4423bd9c4530cdd5d4edc1cc0f02de6c0418dbe88d14daf07d2469f020172c04aefdc8c4b784c85944234fa0831bbdd407474f6f03b4fcedc3c67a47dd59