Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe
-
Size
153KB
-
MD5
5dfdd4a74bd9f10bd50dc09a87ccb8f1
-
SHA1
4b803bbe062e2a4c55651c7ac2690311ff05be81
-
SHA256
a6b0bb2357d899776f74234bc568c3f5f99a112009988a05a5161f50e3cb2ecc
-
SHA512
4f42211b2c170d447d563451a8318ade5e857cead2c80904269c871d0df5777061b58539f6fffa0e6e8bd7169e92844c8baf646e41937f7118eb437833535ca7
-
SSDEEP
3072:18kDzabNDDLofIdsPRcAO5naptsyfH4pq+8:17ubN0ITAO/fq+8
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/files/0x0008000000019377-20.dat family_gh0strat behavioral1/memory/1904-32-0x0000000000400000-0x000000000041D160-memory.dmp family_gh0strat behavioral1/memory/1904-31-0x0000000000401000-0x000000000041E000-memory.dmp family_gh0strat behavioral1/memory/1904-34-0x0000000000020000-0x000000000003E000-memory.dmp family_gh0strat behavioral1/memory/1904-40-0x0000000000400000-0x000000000041D160-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 2 IoCs
pid Process 300 ~server_.exe 1904 win.exe -
Loads dropped DLL 6 IoCs
pid Process 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 300 ~server_.exe 300 ~server_.exe 300 ~server_.exe 1904 win.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ~server_.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~server_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1712 wrote to memory of 300 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 30 PID 1712 wrote to memory of 300 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 30 PID 1712 wrote to memory of 300 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 30 PID 1712 wrote to memory of 300 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 30 PID 1712 wrote to memory of 300 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 30 PID 1712 wrote to memory of 300 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 30 PID 1712 wrote to memory of 300 1712 JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe 30 PID 300 wrote to memory of 1904 300 ~server_.exe 31 PID 300 wrote to memory of 1904 300 ~server_.exe 31 PID 300 wrote to memory of 1904 300 ~server_.exe 31 PID 300 wrote to memory of 1904 300 ~server_.exe 31 PID 300 wrote to memory of 1904 300 ~server_.exe 31 PID 300 wrote to memory of 1904 300 ~server_.exe 31 PID 300 wrote to memory of 1904 300 ~server_.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\~server_.exeC:\Users\Admin\AppData\Local\Temp\\~server_.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\win.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\win.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1904
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD580a0eb3c8259d7bfcc712019e7bd4689
SHA13a46ce36d4d22e4788cc4ea87d5b2734b117f9e5
SHA256db3f536df70c3f8209af86c878013a7bf537fd4069e083b0f0ccaf30883fc0c8
SHA512bea5fdad472cccf7d43bb4f6059c4ab1bb795f05d5dfb404eaede4f31f8a9f74e22abb1e311d862564dc9dd003b6bd75f9030375b8552add13e2f3bb00f50a59
-
Filesize
102KB
MD5ad4357226e7fa6a795308ed54e1600d4
SHA1b2790bab4f3367785a7b720977da1ea40db21520
SHA25696ac75ba9782fb9ef75bef0c19d5a2f846da1ce4dd82af999f2a450b53039262
SHA512b716508fff62e994a7adbe67f3cdffd9092a51f73f659a1056473ac8d3835a2c854d01328466160ec7f93f0fa6bb7fa9a0f277d4db9212c10f2ef6f9427d7485