Analysis
-
max time kernel
122s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe
-
Size
274KB
-
MD5
5d544e23a7097a65484eb603d1023725
-
SHA1
05114a9c0ba9ae21e76cb4459ccb5480d4dfdb55
-
SHA256
3e8a83545e78b52259daa304bfe39aa0e5cabfea341d49543992bcde7efb763f
-
SHA512
28f8173cc6a43e1a9b16d279f193ca4e84aade3de0b9ddddbdfdc788fa6d08abb7806979118abc1c0218ba21fc234856c33c5ed6a95ca436a7acdcaf611ce3e0
-
SSDEEP
6144:gqWPVPoEA71IdU39U3B2+3yyQIyTJbTmKJS1lQzQG/d:gqWPZoEO98H3DbyTg4QG1
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000b000000023c65-59.dat family_gh0strat behavioral2/memory/5076-68-0x0000000000400000-0x0000000000498000-memory.dmp family_gh0strat behavioral2/memory/5076-69-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wewe344sd\Parameters\ServiceDll = "C:\\Windows\\system32\\wewe344sd.dll" rundll32.exe -
Loads dropped DLL 3 IoCs
pid Process 5076 JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe 4284 rundll32.exe 912 svchost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wewe344sd.ini JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4284 5076 JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe 85 PID 5076 wrote to memory of 4284 5076 JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe 85 PID 5076 wrote to memory of 4284 5076 JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d544e23a7097a65484eb603d1023725.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\wewe344sd.dll setup2⤵
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4284
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD59b483fd8fe3058a82c7be10b1324f934
SHA1b231ad500b99efec68225847e120421b22afa9fa
SHA256003ee22eabc24fdc233baf438619092e27f4024e891386b92839a9bd583164e3
SHA5123b278e972d3934baf75d67659ea8c546e2e11676379d0e2318956018479ff81c2f6d240fa53666c4b6e2bff893c4b311076de19dc9c64af248f98c7e38bd20c6