Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2025, 08:15

General

  • Target

    JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe

  • Size

    153KB

  • MD5

    5dfdd4a74bd9f10bd50dc09a87ccb8f1

  • SHA1

    4b803bbe062e2a4c55651c7ac2690311ff05be81

  • SHA256

    a6b0bb2357d899776f74234bc568c3f5f99a112009988a05a5161f50e3cb2ecc

  • SHA512

    4f42211b2c170d447d563451a8318ade5e857cead2c80904269c871d0df5777061b58539f6fffa0e6e8bd7169e92844c8baf646e41937f7118eb437833535ca7

  • SSDEEP

    3072:18kDzabNDDLofIdsPRcAO5naptsyfH4pq+8:17ubN0ITAO/fq+8

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\~server_.exe
      C:\Users\Admin\AppData\Local\Temp\\~server_.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:300
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\win.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\win.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\win.exe

    Filesize

    125KB

    MD5

    80a0eb3c8259d7bfcc712019e7bd4689

    SHA1

    3a46ce36d4d22e4788cc4ea87d5b2734b117f9e5

    SHA256

    db3f536df70c3f8209af86c878013a7bf537fd4069e083b0f0ccaf30883fc0c8

    SHA512

    bea5fdad472cccf7d43bb4f6059c4ab1bb795f05d5dfb404eaede4f31f8a9f74e22abb1e311d862564dc9dd003b6bd75f9030375b8552add13e2f3bb00f50a59

  • \Users\Admin\AppData\Local\Temp\~server_.exe

    Filesize

    102KB

    MD5

    ad4357226e7fa6a795308ed54e1600d4

    SHA1

    b2790bab4f3367785a7b720977da1ea40db21520

    SHA256

    96ac75ba9782fb9ef75bef0c19d5a2f846da1ce4dd82af999f2a450b53039262

    SHA512

    b716508fff62e994a7adbe67f3cdffd9092a51f73f659a1056473ac8d3835a2c854d01328466160ec7f93f0fa6bb7fa9a0f277d4db9212c10f2ef6f9427d7485

  • memory/300-14-0x0000000001000000-0x0000000001040994-memory.dmp

    Filesize

    258KB

  • memory/300-17-0x000000000103B000-0x000000000103C000-memory.dmp

    Filesize

    4KB

  • memory/300-16-0x0000000001000000-0x0000000001040994-memory.dmp

    Filesize

    258KB

  • memory/300-41-0x0000000001000000-0x0000000001040994-memory.dmp

    Filesize

    258KB

  • memory/300-28-0x0000000000120000-0x000000000013E000-memory.dmp

    Filesize

    120KB

  • memory/300-27-0x0000000000120000-0x000000000013E000-memory.dmp

    Filesize

    120KB

  • memory/1712-22-0x0000000000400000-0x000000000042C34C-memory.dmp

    Filesize

    176KB

  • memory/1712-11-0x00000000002F0000-0x0000000000331000-memory.dmp

    Filesize

    260KB

  • memory/1712-0-0x0000000000400000-0x000000000042C34C-memory.dmp

    Filesize

    176KB

  • memory/1904-31-0x0000000000401000-0x000000000041E000-memory.dmp

    Filesize

    116KB

  • memory/1904-34-0x0000000000020000-0x000000000003E000-memory.dmp

    Filesize

    120KB

  • memory/1904-35-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/1904-40-0x0000000000400000-0x000000000041D160-memory.dmp

    Filesize

    116KB

  • memory/1904-32-0x0000000000400000-0x000000000041D160-memory.dmp

    Filesize

    116KB