Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 12:54
Behavioral task
behavioral1
Sample
JaffaCakes118_5f3e3862aac5d3c787670f3a2b589020.dll
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
JaffaCakes118_5f3e3862aac5d3c787670f3a2b589020.dll
-
Size
119KB
-
MD5
5f3e3862aac5d3c787670f3a2b589020
-
SHA1
8999f5e3a647c7078219066eca4e149247159752
-
SHA256
aaa47e8fdd6971adf4a2fb6f254dc779725818b210b4336ad891c59040909fe2
-
SHA512
8a50c6f127bb61c18398d4620618294c11022edf65a8918340cd50f335b1e32a523877656c8594e8d2f0a3c147b27765478cc027094bbc8771351fcaeea38741
-
SSDEEP
3072:P8/CADjE8Ad7hcd8CzKCrYizBVbh02y1gJNIfD6o0BE:uCADzMMLK8Yibe2CmCDp
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4924-0-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral2/memory/4924-1-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral2/memory/4924-4-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Gh0strat family
-
Blocklisted process makes network request 5 IoCs
flow pid Process 43 4924 rundll32.exe 58 4924 rundll32.exe 63 4924 rundll32.exe 70 4924 rundll32.exe 72 4924 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4924 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3572 wrote to memory of 4924 3572 rundll32.exe 85 PID 3572 wrote to memory of 4924 3572 rundll32.exe 85 PID 3572 wrote to memory of 4924 3572 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f3e3862aac5d3c787670f3a2b589020.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f3e3862aac5d3c787670f3a2b589020.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4924
-