Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe
-
Size
156KB
-
MD5
59457611d5bab4789b5b3444e7e5c4ef
-
SHA1
e5e1f9105228c6780cadd724d7cae8a2b5aa0b5b
-
SHA256
5e7598299235a3a273eb643220d8dde2046d01e69038f52043f94b685fbb07b6
-
SHA512
59e3687a9d02ce825b9508cb63d42204ce1e856f3af3457337eda04ada72c262c3b19ef220097795062f776bc7483592f9a71a4fd9c7db2b799c6392a87e37cb
-
SSDEEP
3072:3SQbfCKwr17xC3GFjhURSLOJ0yA0V1+AvBVwAlL6l7J6HyjrAVSD7t7v0udb8YEY:3tbureIGK0V0EcAG7J6q8VSD7J0uB8Yv
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2016-9-0x0000000010000000-0x0000000010039000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe -
Deletes itself 1 IoCs
pid Process 2016 SVCHOST.EXE -
Loads dropped DLL 1 IoCs
pid Process 2016 SVCHOST.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3208 JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe 2016 SVCHOST.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskKiLl.exe -
Kills process with taskkill 1 IoCs
pid Process 2720 taskKiLl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2720 taskKiLl.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3208 wrote to memory of 2720 3208 JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe 86 PID 3208 wrote to memory of 2720 3208 JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe 86 PID 3208 wrote to memory of 2720 3208 JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_59457611d5bab4789b5b3444e7e5c4ef.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\taskKiLl.exetaskKiLl.exe /f /t /im RsTrAy.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -K NETSVCS -s FastUserSwitchingCompatibility1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5fdc0b194acefb2aed141d6c45eb0556e
SHA1437bd6ab2659c257a1b8e10e4fddc342f87fb463
SHA2561ecbfda0194b5dcfd6ddf1c6415a105acd947cb8f168327da4b4d6cceafe8e7d
SHA51233c817e3f29f9b948aa0cf26a68386692f26109bf787ccc74bedf2d7585e65936d28ae48899aaa59e469b0fa2a317d3faa62b6208418cff4af377b30e17f609b