Analysis
-
max time kernel
92s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 22:04
Behavioral task
behavioral1
Sample
JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe
-
Size
86KB
-
MD5
5b800be3632b46f46b79147d1c4c7243
-
SHA1
3961a2d1233460b2442f324615db806afe45e801
-
SHA256
3898841e36bac7f6afed2c52039720a47f6cf405bad7c500bca316547f2b59e6
-
SHA512
f9fa5505f85499e39b7fb30c857f0c8afbee21599c7156e1d76681ffb094f3ed71555f703891a325d08eb18ceace10c37840e099ad6854cadba133bfd938bc87
-
SSDEEP
1536:f0jgaEGFDMbbMt9ODnjfiwKcuybfLIeEwKJB4AY4eEtgreOv3/DRI:MjgTGFIMDODn+wKByrLIeNKJBZ2EtIe+
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001000000001ee2b-2.dat family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{774BDE8B-EB38-40bb-9399-479FAB1FE446} JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{774BDE8B-EB38-40bb-9399-479FAB1FE446}\stubpath = "C:\\Windows\\system32\\WinHelp32.exe" JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe -
Executes dropped EXE 1 IoCs
pid Process 4800 WinHelp32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHelp32.exe JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe File opened for modification C:\Windows\SysWOW64\WinHelp32.exe JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 6056 JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 6056 wrote to memory of 4800 6056 JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe 90 PID 6056 wrote to memory of 4800 6056 JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe 90 PID 6056 wrote to memory of 4800 6056 JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe 90 PID 6056 wrote to memory of 3900 6056 JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe 91 PID 6056 wrote to memory of 3900 6056 JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe 91 PID 6056 wrote to memory of 3900 6056 JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe 91 PID 4800 wrote to memory of 6040 4800 WinHelp32.exe 92 PID 4800 wrote to memory of 6040 4800 WinHelp32.exe 92 PID 4800 wrote to memory of 6040 4800 WinHelp32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b800be3632b46f46b79147d1c4c7243.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6056 -
C:\Windows\SysWOW64\WinHelp32.exeC:\Windows\system32\WinHelp32.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:6040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD55b800be3632b46f46b79147d1c4c7243
SHA13961a2d1233460b2442f324615db806afe45e801
SHA2563898841e36bac7f6afed2c52039720a47f6cf405bad7c500bca316547f2b59e6
SHA512f9fa5505f85499e39b7fb30c857f0c8afbee21599c7156e1d76681ffb094f3ed71555f703891a325d08eb18ceace10c37840e099ad6854cadba133bfd938bc87