Analysis

  • max time kernel
    124s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2025, 03:59

General

  • Target

    JaffaCakes118_5cee11983cd707cacaf411ccf5208fdb.exe

  • Size

    264KB

  • MD5

    5cee11983cd707cacaf411ccf5208fdb

  • SHA1

    2dc0dbbc2ed04e2d93bf68aed79f6c9ed76abbd5

  • SHA256

    8651853f367521ba0fb628702a7684cff2597032460de8e21615af467bc51ade

  • SHA512

    a36c59cb991390b06af1cd308136bca4009b7ba7346391724e021adb8643d47be58a8f8f19488acf878ebf5ffbc63db78f030ca6e4529eefc0a8f4372708f3d1

  • SSDEEP

    6144:KNJPCugeV0TXPoBQfFMLEwjNDDEx1GsoozQ9bnO:KNRHgeV0zoiaL/Jk5

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cee11983cd707cacaf411ccf5208fdb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5cee11983cd707cacaf411ccf5208fdb.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Program Files\Common Files\alibao.exe
      "C:\Program Files\Common Files\alibao.exe" "C:\Program Files\Common Files\alibao.dll" ServiceMain
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1684
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files\Common Files\alihao.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Program Files\Common Files\alibao.VBS"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2336
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\alibao.VBS

    Filesize

    1KB

    MD5

    116a7142bbe72653f8ea7c8a9a568c3b

    SHA1

    8149a7db5bd43bb51454e4ccb11a5a41ef6a7dde

    SHA256

    e41de1869ca1f14c4bdafbfadd7a769184014ceead652aeba326659368e6c695

    SHA512

    3e463fd656afe51c403afb002c43e27a5c3e3a52543691c648c3253b377ec2afa4bf237b29566341b350c0d4d0e4c90a092d779e7b557fb196888e7cf89abbc7

  • C:\Program Files\Common Files\alibao.dll

    Filesize

    24.1MB

    MD5

    960e08a2c649cc243350546d91b5d55f

    SHA1

    2d33b4e14b820faf1acdf02afd01a76eefab6f0a

    SHA256

    aa3888c11c51c7f5503fd4502f8d5486311932498e16599952892fa164851988

    SHA512

    fc169d50f2ee199ad6f5c5a556e9903a4e74cc14f67eb24b2286e514019fedbd8372c270a573bc063669347df74d0eae5aa7faf395ee905613293baa69ee4258

  • C:\Program Files\Common Files\alihao.bat

    Filesize

    57B

    MD5

    1cdb9bcf58f9a3764fca74fb9f3fbfc3

    SHA1

    12bee8a9862242ed39d4316b11b4c568c778ba0b

    SHA256

    4fbd276e36e32db6ef3ba7d86d57c56b870575d76adcdcd82829acd8a7ccc950

    SHA512

    1bc9a5d46df7f91a7b36dd3050d034a43a67bf66cdf27b5f84ce5ed0542c5b51defabbd6c38408cc1e340b4fc26f652034ee19bd24d86d495d75e54a6497acc6

  • \Program Files\Common Files\alibao.exe

    Filesize

    43KB

    MD5

    51138beea3e2c21ec44d0932c71762a8

    SHA1

    8939cf35447b22dd2c6e6f443446acc1bf986d58

    SHA256

    5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

    SHA512

    794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

  • memory/1684-24-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/1684-28-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/1684-59-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/1684-25-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/1684-27-0x0000000020000000-0x0000000020027000-memory.dmp

    Filesize

    156KB

  • memory/2908-4-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2908-0-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2908-3-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2908-8-0x0000000000330000-0x0000000000332000-memory.dmp

    Filesize

    8KB

  • memory/2908-6-0x00000000002E0000-0x000000000031E000-memory.dmp

    Filesize

    248KB

  • memory/2908-29-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2908-1-0x00000000002D0000-0x0000000000342000-memory.dmp

    Filesize

    456KB

  • memory/2908-40-0x0000000000400000-0x0000000000472000-memory.dmp

    Filesize

    456KB

  • memory/2908-41-0x00000000002E0000-0x000000000031E000-memory.dmp

    Filesize

    248KB

  • memory/2908-2-0x00000000002E0000-0x000000000031E000-memory.dmp

    Filesize

    248KB

  • memory/2908-7-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB