Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe
-
Size
95KB
-
MD5
5fb1e921b2c9aae7c2787b218dc7dadf
-
SHA1
8c81916e147b6c11a61d05eab00c82272a770964
-
SHA256
449a1158df3aeb57bd1ae6cb39121495069c6da34c80e5bbc6ad25f518fe2a14
-
SHA512
bee49d64d7fe6cac132050f06233d4e98dd178b61f696fff7acb8e23e04f4536fedcd96277e32043158ef59e34799fca291291441b937cb1d818766c6762f5c7
-
SSDEEP
1536:KRFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prfltf5kf:KHS4jHS8q/3nTzePCwNUh4E9fLuf
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000018b68-19.dat family_gh0strat behavioral1/memory/2380-21-0x0000000000400000-0x000000000044E24C-memory.dmp family_gh0strat behavioral1/memory/2724-24-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2724-26-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2380 hujqqbrekd -
Executes dropped EXE 1 IoCs
pid Process 2380 hujqqbrekd -
Loads dropped DLL 3 IoCs
pid Process 1916 JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe 1916 JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe 2724 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ismaukkjsg svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hujqqbrekd Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2380 hujqqbrekd 2724 svchost.exe 2724 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 2380 hujqqbrekd Token: SeBackupPrivilege 2380 hujqqbrekd Token: SeBackupPrivilege 2380 hujqqbrekd Token: SeRestorePrivilege 2380 hujqqbrekd Token: SeBackupPrivilege 2724 svchost.exe Token: SeRestorePrivilege 2724 svchost.exe Token: SeBackupPrivilege 2724 svchost.exe Token: SeBackupPrivilege 2724 svchost.exe Token: SeSecurityPrivilege 2724 svchost.exe Token: SeSecurityPrivilege 2724 svchost.exe Token: SeBackupPrivilege 2724 svchost.exe Token: SeBackupPrivilege 2724 svchost.exe Token: SeSecurityPrivilege 2724 svchost.exe Token: SeBackupPrivilege 2724 svchost.exe Token: SeBackupPrivilege 2724 svchost.exe Token: SeSecurityPrivilege 2724 svchost.exe Token: SeBackupPrivilege 2724 svchost.exe Token: SeRestorePrivilege 2724 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2380 1916 JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe 30 PID 1916 wrote to memory of 2380 1916 JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe 30 PID 1916 wrote to memory of 2380 1916 JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe 30 PID 1916 wrote to memory of 2380 1916 JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\users\admin\appdata\local\hujqqbrekd"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_5fb1e921b2c9aae7c2787b218dc7dadf.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.0MB
MD542e90deb63adae110120f541d75f4814
SHA1bea87858a319777d7c4f97e8727cbf7387c4f81e
SHA256e2ab744583fa2167c0a52e8b236d1aaf1b25336e5660c41fcfd5f8acba40626e
SHA512d9ef7a98753a34ebf9d24a195a841aedcf7494f3fcf8a4f0cf7d9684a68a8971bad21deeecb837009be828d40168c4d0006e6c11a8cc1a906c5e3f29a63b578b
-
Filesize
23.0MB
MD517305e865523b3f7e36f0822d3f29c8f
SHA102c81ae8325885344197444ca57ab9b35aee9276
SHA256a3218549c6732bfa078f9e8d91b3728ada49be4fa9f7dd61c72d75752d4330ff
SHA512b9fe3eaed592868d4da873eb323a654ecc42f1c859dfc3db4e63b87ef297eb9122aef3adf1b2930a748f16c92b90c9020f5a17cf625b5e5d0911796a48ce7aee