Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe
-
Size
777KB
-
MD5
5bad00590a2986a576d6fa47fe7c8951
-
SHA1
b19978f61206fce13887a46eff565c32c3d93681
-
SHA256
6a7c816b7dbcc0307915f3345bc00e3ba0a70dad7a5f2fea59bf0a685aa5f8f6
-
SHA512
4b47be04d06958f5c7b4f3486dc32002ad39f8620d5aa626b3e58f4bec5df9f49d925048ce591833e18ae36f397fe61b54af6651cc50d75e38a77253a751123b
-
SSDEEP
24576:BAxFc9euQ+pscajhLvElo2McbhjrbWI62FGy4+:GxFck5hgl/bhjrbW
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/4892-5-0x0000000000400000-0x00000000005B1000-memory.dmp family_gh0strat behavioral2/memory/4892-6-0x0000000000400000-0x00000000005B1000-memory.dmp family_gh0strat behavioral2/memory/2688-18-0x0000000000400000-0x00000000005B1000-memory.dmp family_gh0strat behavioral2/memory/2688-17-0x0000000000400000-0x00000000005B1000-memory.dmp family_gh0strat behavioral2/files/0x000b000000023bf3-21.dat family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C662548F-1240-4007-B64B-873D4C677591} JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C662548F-1240-4007-B64B-873D4C677591}\stubpath = "C:\\Windows\\system32\\inetlfmxc.exe" JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 inetlfmxc.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine inetlfmxc.exe -
Loads dropped DLL 1 IoCs
pid Process 3200 userinit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\inetlfmxc.exe JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe File opened for modification C:\Windows\SysWOW64\inetlfmxc.exe_lang.ini JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 2688 inetlfmxc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inetlfmxc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language userinit.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 2688 inetlfmxc.exe 2688 inetlfmxc.exe 2688 inetlfmxc.exe 2688 inetlfmxc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe Token: SeDebugPrivilege 2688 inetlfmxc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2688 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 86 PID 4892 wrote to memory of 2688 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 86 PID 4892 wrote to memory of 2688 4892 JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe 86 PID 2688 wrote to memory of 3200 2688 inetlfmxc.exe 88 PID 2688 wrote to memory of 3200 2688 inetlfmxc.exe 88 PID 2688 wrote to memory of 3200 2688 inetlfmxc.exe 88 PID 2688 wrote to memory of 3200 2688 inetlfmxc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5bad00590a2986a576d6fa47fe7c8951.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\userinit.exeuserinit.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5124ba8d8d8dd18a1d2596476acd582ab
SHA15eafdba4c19da7cf9c2bb9b42e33ddd98e39c8c5
SHA2563100399421e109eaa3722bfb1f2bb07764d34a0986765eeadee33e97d501d3f0
SHA512b7db575066f11fbcc7c112cbc4eed3f8c2bcc3224dcfc689183f04ee0ce95fe7eda4370c4c5f06b2afd1d0dc7fac23843fc7dfb51827690fe6734f81f00a7e38
-
Filesize
777KB
MD557a0ae23c30eceed6c35a7ab695884ab
SHA11f38cd020c3beb9b9b3f98b31f3ec492e001d246
SHA256a8af0be63fea150649419a3a0520584345dce29cc987b67d77485a8a416877cd
SHA5129fb1f66ad3c4c90bf41d55489ac73440bb481954c998b2a139f7d1c5b3e037d94314599c15b1f5feeac47762ae2648c7e86b81e7e668b010f4158b34f59d2df1