Analysis

  • max time kernel
    93s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2025, 08:15

General

  • Target

    JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe

  • Size

    153KB

  • MD5

    5dfdd4a74bd9f10bd50dc09a87ccb8f1

  • SHA1

    4b803bbe062e2a4c55651c7ac2690311ff05be81

  • SHA256

    a6b0bb2357d899776f74234bc568c3f5f99a112009988a05a5161f50e3cb2ecc

  • SHA512

    4f42211b2c170d447d563451a8318ade5e857cead2c80904269c871d0df5777061b58539f6fffa0e6e8bd7169e92844c8baf646e41937f7118eb437833535ca7

  • SSDEEP

    3072:18kDzabNDDLofIdsPRcAO5naptsyfH4pq+8:17ubN0ITAO/fq+8

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dfdd4a74bd9f10bd50dc09a87ccb8f1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\~server_.exe
      C:\Users\Admin\AppData\Local\Temp\\~server_.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\win.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\win.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\win.exe

    Filesize

    125KB

    MD5

    80a0eb3c8259d7bfcc712019e7bd4689

    SHA1

    3a46ce36d4d22e4788cc4ea87d5b2734b117f9e5

    SHA256

    db3f536df70c3f8209af86c878013a7bf537fd4069e083b0f0ccaf30883fc0c8

    SHA512

    bea5fdad472cccf7d43bb4f6059c4ab1bb795f05d5dfb404eaede4f31f8a9f74e22abb1e311d862564dc9dd003b6bd75f9030375b8552add13e2f3bb00f50a59

  • C:\Users\Admin\AppData\Local\Temp\~server_.exe

    Filesize

    102KB

    MD5

    ad4357226e7fa6a795308ed54e1600d4

    SHA1

    b2790bab4f3367785a7b720977da1ea40db21520

    SHA256

    96ac75ba9782fb9ef75bef0c19d5a2f846da1ce4dd82af999f2a450b53039262

    SHA512

    b716508fff62e994a7adbe67f3cdffd9092a51f73f659a1056473ac8d3835a2c854d01328466160ec7f93f0fa6bb7fa9a0f277d4db9212c10f2ef6f9427d7485

  • memory/3368-8-0x0000000001000000-0x0000000001040994-memory.dmp

    Filesize

    258KB

  • memory/3368-9-0x0000000001000000-0x0000000001040994-memory.dmp

    Filesize

    258KB

  • memory/3368-10-0x0000000001021000-0x0000000001022000-memory.dmp

    Filesize

    4KB

  • memory/3368-23-0x0000000001000000-0x0000000001040994-memory.dmp

    Filesize

    258KB

  • memory/4224-0-0x0000000000400000-0x000000000042C34C-memory.dmp

    Filesize

    176KB

  • memory/4224-13-0x0000000000400000-0x000000000042C34C-memory.dmp

    Filesize

    176KB

  • memory/4528-16-0x0000000000400000-0x000000000041D160-memory.dmp

    Filesize

    116KB

  • memory/4528-22-0x0000000000400000-0x000000000041D160-memory.dmp

    Filesize

    116KB