Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 12:58
Behavioral task
behavioral1
Sample
JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe
-
Size
70KB
-
MD5
592420158f89efbb28d0bdb904c19de4
-
SHA1
d068f6d7fab9cb50240cbe1512bf996e2dfc1001
-
SHA256
2a1034dd32bf7a79fa810ac42fe1c27ace6955bdb21b2f12db0322880ac39c18
-
SHA512
27b07297efa856eb3fd50853295fe104e9b73520d6a91742ecd57d42fda2385b6ab7837ba6fd2955f41b922456832ef1bbf890b6bf90b858979596a1e58dc3be
-
SSDEEP
768:YqpmE7/ab4ZzVFT5W2LbMGc6dLhFoYlUEfXA6/nZkxHvHc1kv/n6Ur8xPFpzUfo:mef5W2BcqoWfXA6PZCv81k8zUA
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1960-10-0x0000000000400000-0x0000000000416000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 1 IoCs
pid Process 3288 Sogou.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KRIS = "C:\\Windows\\Sogou.exe" JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\svchest.ini Sogou.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Sogou.exe JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe File opened for modification C:\Windows\Sogou.exe JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sogou.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 2 IoCs
pid Process 4236 taskkill.exe 3944 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe 3288 Sogou.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1960 JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4236 taskkill.exe Token: SeDebugPrivilege 3944 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1960 wrote to memory of 4236 1960 JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe 85 PID 1960 wrote to memory of 4236 1960 JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe 85 PID 1960 wrote to memory of 4236 1960 JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe 85 PID 1960 wrote to memory of 3288 1960 JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe 88 PID 1960 wrote to memory of 3288 1960 JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe 88 PID 1960 wrote to memory of 3288 1960 JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe 88 PID 3288 wrote to memory of 3944 3288 Sogou.exe 92 PID 3288 wrote to memory of 3944 3288 Sogou.exe 92 PID 3288 wrote to memory of 3944 3288 Sogou.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_592420158f89efbb28d0bdb904c19de4.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\Sogou.exeC:\Windows\Sogou.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD5f537bd72a0991fd0f2b184a94dfe76ab
SHA11ad19ad7a4a1b9d3d78c14dd5a760063c5d13dfa
SHA25617e1af3fb61c8c169e0a676b60365c0e6ac47734cbc0f19182665d7260f9b900
SHA512ac2644c52ac85e9479cea6c6d6e8f6072329c4ca8b78d105cf98a902fc6b6d87e758a525cb00bbc4f22ab7ef071363ce25a6c7a24a41a6a56928b88a406e6c71