Analysis
-
max time kernel
78s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe
-
Size
96KB
-
MD5
5b740c8a44fc00d67b88a9685fa7f038
-
SHA1
c7111cb7dc916d0497d5f3ca40685cc4bd26f9be
-
SHA256
1c221f9ecc204c8afd01456e0aec5db1229eb90f77f69e72d461187b430cec26
-
SHA512
da029a40d1d81f8917cba906b098aad25a92b4d418667da2ea919deb8a5508c618ae0b730f45cd7569fc543a92c0a9100e141c8bebc77cf59f901c6dbde8c2b6
-
SSDEEP
1536:OmFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8pr9cgdO1Gp3v:OsS4jHS8q/3nTzePCwNUh4E9Ukp/
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/files/0x00060000000229cb-14.dat family_gh0strat behavioral2/memory/1868-16-0x0000000000400000-0x000000000044E2C0-memory.dmp family_gh0strat behavioral2/memory/3428-19-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/2484-24-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral2/memory/3896-29-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 1868 mllgpqwmri -
Executes dropped EXE 1 IoCs
pid Process 1868 mllgpqwmri -
Loads dropped DLL 3 IoCs
pid Process 3428 svchost.exe 2484 svchost.exe 3896 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\imfqivvoba svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\iusjqyxlou svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\imfqivvoba svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 868 3428 WerFault.exe 95 4152 2484 WerFault.exe 100 4084 3896 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mllgpqwmri Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 mllgpqwmri 1868 mllgpqwmri -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 1868 mllgpqwmri Token: SeBackupPrivilege 1868 mllgpqwmri Token: SeBackupPrivilege 1868 mllgpqwmri Token: SeRestorePrivilege 1868 mllgpqwmri Token: SeBackupPrivilege 3428 svchost.exe Token: SeRestorePrivilege 3428 svchost.exe Token: SeBackupPrivilege 3428 svchost.exe Token: SeBackupPrivilege 3428 svchost.exe Token: SeSecurityPrivilege 3428 svchost.exe Token: SeSecurityPrivilege 3428 svchost.exe Token: SeBackupPrivilege 3428 svchost.exe Token: SeBackupPrivilege 3428 svchost.exe Token: SeSecurityPrivilege 3428 svchost.exe Token: SeBackupPrivilege 3428 svchost.exe Token: SeBackupPrivilege 3428 svchost.exe Token: SeSecurityPrivilege 3428 svchost.exe Token: SeBackupPrivilege 3428 svchost.exe Token: SeRestorePrivilege 3428 svchost.exe Token: SeBackupPrivilege 2484 svchost.exe Token: SeRestorePrivilege 2484 svchost.exe Token: SeBackupPrivilege 2484 svchost.exe Token: SeBackupPrivilege 2484 svchost.exe Token: SeSecurityPrivilege 2484 svchost.exe Token: SeSecurityPrivilege 2484 svchost.exe Token: SeBackupPrivilege 2484 svchost.exe Token: SeBackupPrivilege 2484 svchost.exe Token: SeSecurityPrivilege 2484 svchost.exe Token: SeBackupPrivilege 2484 svchost.exe Token: SeBackupPrivilege 2484 svchost.exe Token: SeSecurityPrivilege 2484 svchost.exe Token: SeBackupPrivilege 2484 svchost.exe Token: SeRestorePrivilege 2484 svchost.exe Token: SeBackupPrivilege 3896 svchost.exe Token: SeRestorePrivilege 3896 svchost.exe Token: SeBackupPrivilege 3896 svchost.exe Token: SeBackupPrivilege 3896 svchost.exe Token: SeSecurityPrivilege 3896 svchost.exe Token: SeSecurityPrivilege 3896 svchost.exe Token: SeBackupPrivilege 3896 svchost.exe Token: SeBackupPrivilege 3896 svchost.exe Token: SeSecurityPrivilege 3896 svchost.exe Token: SeBackupPrivilege 3896 svchost.exe Token: SeBackupPrivilege 3896 svchost.exe Token: SeSecurityPrivilege 3896 svchost.exe Token: SeBackupPrivilege 3896 svchost.exe Token: SeRestorePrivilege 3896 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4356 wrote to memory of 1868 4356 JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe 90 PID 4356 wrote to memory of 1868 4356 JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe 90 PID 4356 wrote to memory of 1868 4356 JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\users\admin\appdata\local\mllgpqwmri"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b740c8a44fc00d67b88a9685fa7f038.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_5b740c8a44fc00d67b88a9685fa7f038.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 10522⤵
- Program crash
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3428 -ip 34281⤵PID:1924
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 7802⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2484 -ip 24841⤵PID:4384
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 10922⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3896 -ip 38961⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD5aa3012dfb35b8c0bfa5b2c04f424bb13
SHA1b8e3c39cbb67d53c102187b894a8a5e1eb539385
SHA256b0ffe4d4923db7335e6e62ca7c0a3ee6d93b1d0851bb0d5536689e6e9d19cf0d
SHA512c9739d6d78cafaf616bc34b22774fc7db3c2cfd443db650d49bdc40856e2b0e4d99d1040681ff33bf22f4258327f3039f0326857c93278e47e45322618af2471
-
Filesize
300B
MD5edd83a0991afe3b581a46ca721f8cc0e
SHA18c89c36f79b6e4ce3a9306d84a9e0c126394da49
SHA256d0812d9955824281bfb5eeea2187f1168d390cbebcb7de27e7f0f0869f8a82d5
SHA512a87c204735a377e51cca7a7e7170cd06065b81a076672af301752e9d9fc4a2f0541677b6e80ccbab94abca6ae502b157a579e11705d4c344633f534cbd5c4b48
-
Filesize
23.0MB
MD5a443ca06e9f31cfaec70c4cdd4f7f9e2
SHA1b978c40b78e28164cc0f95c6c7a02e8f9e155ed1
SHA25684f858b019e8684ff6dcebbae2819467f71334d7b1b27fcc2330da1337403b9d
SHA5122607cd86f55c65897d28aa8802735fa2645dfa7eb13aacdd235d72037f970c12a5708f6034254956e5834342afa47823450afae8d321b5cd472f0f3e9a23bba6
-
Filesize
19.9MB
MD54b08b0245fde26a5eb18704183cc0a6a
SHA11fc49c5d9e83d54d5f0b9dfba7c46cda899af332
SHA25617f4ca1964ba1d43895b9ff85f6373a9f8a91822e81da1c6ca680a7715e66ba8
SHA51281cf0340031b5cef30b9670b93bc18256b40094c6e98e5093190c561915198c2dc76ba20d50459ecfa66cb6041f77fbf2078a6b4453b701477f38e7265adc093