Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 22:32
Behavioral task
behavioral1
Sample
JaffaCakes118_5b9bed1b1a61c5fb1e74b28261442f18.dll
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
JaffaCakes118_5b9bed1b1a61c5fb1e74b28261442f18.dll
-
Size
149KB
-
MD5
5b9bed1b1a61c5fb1e74b28261442f18
-
SHA1
937378e1ad39da19bf655ccd7756609d4efe87bb
-
SHA256
3883f9579f5ca767b64547994c445270c7806511748044a2373182b4bb851530
-
SHA512
784b1bde22c355c9fe5a47cae54fdf4485380e959cbc2b74b1a80c6a0873da960626ea344dccec29898f80facaf70229b494b4e2f32250be8131843f5b6c7595
-
SSDEEP
3072:3HezSLLqGcRcRCnM30k4mdX0SHAYHTBftcVl0pCc0y:3+zSrCnuX0SH9HTBlcK0y
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2100-0-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat behavioral1/memory/2100-2-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat -
Gh0strat family
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rundll32.exe.txt rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2656 2100 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2100 1836 rundll32.exe 30 PID 1836 wrote to memory of 2100 1836 rundll32.exe 30 PID 1836 wrote to memory of 2100 1836 rundll32.exe 30 PID 1836 wrote to memory of 2100 1836 rundll32.exe 30 PID 1836 wrote to memory of 2100 1836 rundll32.exe 30 PID 1836 wrote to memory of 2100 1836 rundll32.exe 30 PID 1836 wrote to memory of 2100 1836 rundll32.exe 30 PID 2100 wrote to memory of 2656 2100 rundll32.exe 31 PID 2100 wrote to memory of 2656 2100 rundll32.exe 31 PID 2100 wrote to memory of 2656 2100 rundll32.exe 31 PID 2100 wrote to memory of 2656 2100 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9bed1b1a61c5fb1e74b28261442f18.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5b9bed1b1a61c5fb1e74b28261442f18.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 603⤵
- Program crash
PID:2656
-
-