Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 11:32
Behavioral task
behavioral1
Sample
JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad.exe
-
Size
105KB
-
MD5
5edf022b564d50bfd6a02a2de6745dad
-
SHA1
bce03b27545331c68c75959e33cd587b4193c14b
-
SHA256
522a61b98d71853bf653510da30f2b4ad437d0ff22a393172bac6d7eb6e91a8e
-
SHA512
8373e6b5c69aa1ca582b6ce6056af9e12685bde7e25cecc7140db066422294d61e19c1db69cd927fcfbadc431ca62480b32b26e5bccfb9619f669980b7d159bf
-
SSDEEP
3072:F8G6SyGxDPgaiT/t0nijg1DBIM9SlWATw+DkUhcUEdWK:+lSyGtorT/10DC2SlWAw+gUhbSF
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/3712-0-0x0000000000400000-0x000000000041C000-memory.dmp family_gh0strat behavioral2/files/0x000c000000023c28-4.dat family_gh0strat behavioral2/memory/3712-6-0x0000000000400000-0x000000000041C000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityex.dll" JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad.exe -
Deletes itself 1 IoCs
pid Process 3512 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 3512 svchost.exe -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 24 98.126.104.66 3512 svchost.exe Destination IP 66 98.126.104.66 3512 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilityex.dll JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5edf022b564d50bfd6a02a2de6745dad.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3712
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Deletes itself
- Loads dropped DLL
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD592c01801ef67e9518a27b4220f7caab1
SHA188d9d917550f042af746f8d33191090d1cd1ce02
SHA25648f28a30249e27d9dfc70b99808c7000dee93a5efa0685ca455b9019ddf8e469
SHA512318361dc550ea26526984e29a524ba86c5c0992f2ce46190eedc4664b51ed9a4281e27ad049fe7b4afeac11cd65483fb9e682f7c88c811416ef5e59f1bbd2378