Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe
-
Size
1.4MB
-
MD5
5882be5ac896bc4449218b021b83e4ca
-
SHA1
991f9070e81d406da545ab260865f95de5630d55
-
SHA256
a6b4f60f243d338998b61d2ce411460e8f55ba1549823a8db595d3c16e23e724
-
SHA512
9e6c5362ac531a0dc1eb8d518c60b47e13b10f204af06e0b2f13eedcfb77a7010c9d7a7819e3b65a592f6a91d09380b180811c7055b1d44f61ab77260aff8783
-
SSDEEP
24576:nbej8Qxl/rPlFADavc8g/p3MnRK4jys2clU6vV5Dk8FmOZRdcBsBPqf4W+Iosf5:WtxlhF7v1gR8nRNQIJBoOZ/Potq
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/memory/2968-18-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral1/memory/2736-30-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral1/memory/2736-31-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral1/memory/2968-32-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral1/memory/2736-35-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral1/memory/2736-41-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\2031375\Parameters\ServiceDll = "C:\\Windows\\system32\\2031375.dll" JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe -
Loads dropped DLL 5 IoCs
pid Process 2968 svchost.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\2031375.dll JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\IEHost2.txt svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2112 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe Token: SeDebugPrivilege 2968 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2772 2112 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe 32 PID 2112 wrote to memory of 2772 2112 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe 32 PID 2112 wrote to memory of 2772 2112 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe 32 PID 2112 wrote to memory of 2772 2112 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe 32 PID 2968 wrote to memory of 2736 2968 svchost.exe 33 PID 2968 wrote to memory of 2736 2968 svchost.exe 33 PID 2968 wrote to memory of 2736 2968 svchost.exe 33 PID 2968 wrote to memory of 2736 2968 svchost.exe 33 PID 2968 wrote to memory of 2736 2968 svchost.exe 33 PID 2968 wrote to memory of 2736 2968 svchost.exe 33 PID 2968 wrote to memory of 2736 2968 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k 20313751⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\2031375.dll, ServiceMain2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2736
-