Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe
-
Size
1.4MB
-
MD5
5882be5ac896bc4449218b021b83e4ca
-
SHA1
991f9070e81d406da545ab260865f95de5630d55
-
SHA256
a6b4f60f243d338998b61d2ce411460e8f55ba1549823a8db595d3c16e23e724
-
SHA512
9e6c5362ac531a0dc1eb8d518c60b47e13b10f204af06e0b2f13eedcfb77a7010c9d7a7819e3b65a592f6a91d09380b180811c7055b1d44f61ab77260aff8783
-
SSDEEP
24576:nbej8Qxl/rPlFADavc8g/p3MnRK4jys2clU6vV5Dk8FmOZRdcBsBPqf4W+Iosf5:WtxlhF7v1gR8nRNQIJBoOZ/Potq
Malware Config
Signatures
-
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral2/memory/2012-19-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral2/memory/5072-25-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral2/memory/2012-26-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral2/memory/5072-29-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral2/memory/2012-34-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral2/memory/5072-35-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat behavioral2/memory/2012-56-0x0000000010000000-0x0000000010090000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\2031375\Parameters\ServiceDll = "C:\\Windows\\system32\\2031375.dll" JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe -
Loads dropped DLL 2 IoCs
pid Process 2012 svchost.exe 5072 rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\2031375.dll JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\IEHost2.txt svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4812 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe Token: SeDebugPrivilege 2012 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4812 wrote to memory of 4236 4812 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe 88 PID 4812 wrote to memory of 4236 4812 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe 88 PID 4812 wrote to memory of 4236 4812 JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe 88 PID 2012 wrote to memory of 5072 2012 svchost.exe 90 PID 2012 wrote to memory of 5072 2012 svchost.exe 90 PID 2012 wrote to memory of 5072 2012 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5882be5ac896bc4449218b021b83e4ca.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4236
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k 20313751⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\windows\system32\2031375.dll, ServiceMain2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5072
-