Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe
-
Size
777KB
-
MD5
5bad00590a2986a576d6fa47fe7c8951
-
SHA1
b19978f61206fce13887a46eff565c32c3d93681
-
SHA256
6a7c816b7dbcc0307915f3345bc00e3ba0a70dad7a5f2fea59bf0a685aa5f8f6
-
SHA512
4b47be04d06958f5c7b4f3486dc32002ad39f8620d5aa626b3e58f4bec5df9f49d925048ce591833e18ae36f397fe61b54af6651cc50d75e38a77253a751123b
-
SSDEEP
24576:BAxFc9euQ+pscajhLvElo2McbhjrbWI62FGy4+:GxFck5hgl/bhjrbW
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2672-17-0x0000000000400000-0x00000000005B1000-memory.dmp family_gh0strat behavioral1/memory/2316-25-0x0000000000400000-0x00000000005B1000-memory.dmp family_gh0strat behavioral1/files/0x0006000000018731-27.dat family_gh0strat behavioral1/memory/2316-22-0x0000000000400000-0x00000000005B1000-memory.dmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{95E58F7D-769E-4a6b-BA53-737B396DA40F}\stubpath = "C:\\Windows\\system32\\inwixlnmf.exe" JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{95E58F7D-769E-4a6b-BA53-737B396DA40F} JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 inwixlnmf.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine inwixlnmf.exe -
Loads dropped DLL 5 IoCs
pid Process 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 2316 inwixlnmf.exe 2316 inwixlnmf.exe 2316 inwixlnmf.exe 2924 userinit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\inwixlnmf.exe JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe File opened for modification C:\Windows\SysWOW64\inwixlnmf.exe_lang.ini JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 2316 inwixlnmf.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inwixlnmf.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 2316 inwixlnmf.exe 2316 inwixlnmf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe Token: SeDebugPrivilege 2316 inwixlnmf.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2316 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 30 PID 2672 wrote to memory of 2316 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 30 PID 2672 wrote to memory of 2316 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 30 PID 2672 wrote to memory of 2316 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 30 PID 2672 wrote to memory of 2316 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 30 PID 2672 wrote to memory of 2316 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 30 PID 2672 wrote to memory of 2316 2672 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 30 PID 2316 wrote to memory of 2924 2316 inwixlnmf.exe 31 PID 2316 wrote to memory of 2924 2316 inwixlnmf.exe 31 PID 2316 wrote to memory of 2924 2316 inwixlnmf.exe 31 PID 2316 wrote to memory of 2924 2316 inwixlnmf.exe 31 PID 2316 wrote to memory of 2924 2316 inwixlnmf.exe 31 PID 2316 wrote to memory of 2924 2316 inwixlnmf.exe 31 PID 2316 wrote to memory of 2924 2316 inwixlnmf.exe 31 PID 2316 wrote to memory of 2924 2316 inwixlnmf.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\userinit.exeuserinit.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD503160c6734bdecb636e2786d93aab4ee
SHA1c6acd19d0c66c1c471e233893b75b3a3904b242c
SHA25615a2260d56ee8dd056d527af03b903b58eaff719781dcd2b4382b3b94ba48d1e
SHA512f3d7f818a4d572374048327c50f5cde19f371accd5dcae187a38fe6b037f84c0541bb54ad90c5df8eb75dd3db33d8aa580a61cdf77a72518357ea5617fee862d
-
Filesize
777KB
MD5ef63d03bb5a544959dd52cb88c131530
SHA12aa7e719ddac28d9c6ae330090bcbcfe76aab500
SHA256c23ef0f2649c2a66279dbf44d9ce235e2f6eefa1f3972559435f147947e1ff90
SHA5129e1cd925c912790cf4be405693c3ecca1d5fb57f79361072d665c5db0c93d5fd5e55e9e772f5f0541a452633860dd87992afa0846f658606d98d43c5f203a63e