Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 16:37
Behavioral task
behavioral1
Sample
JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe
-
Size
185KB
-
MD5
603b93d3a8ca162e656d66116cdad792
-
SHA1
7f62616012c36d6a1bd121e77869071239d72a87
-
SHA256
5945103c45c1ed26f7e3274a8addb1ae95a12d4e88ae2e526714820a0b215218
-
SHA512
9d80ddee599491735b0a7939088ea190d12a0ae150d1329e2f051ac05849fabca2d3fca017f630383f69a43791dc1d8a1efa55b8046c97e39718d7dab915d851
-
SSDEEP
3072:DVa/B5BBu+bcxBbe+DJkHNDyya/B5BBu+bcxBbe+DJkHNDy1tyk:yr0bxFnDJ8+r0bxFnDJ8Qtb
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2816-0-0x0000000000400000-0x0000000000430000-memory.dmp family_gh0strat behavioral1/files/0x0007000000012117-2.dat family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\07060001\Parameters\ServiceDll = "C:\\Windows\\system32\\259415528.dll" JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe -
Deletes itself 1 IoCs
pid Process 2660 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2660 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\259415528.dll JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2816
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5b1f352c9e8dc617c993ca908b65eaef8
SHA1ed49994c3e839789c202267413813638976328e6
SHA256c74b9a770b8323e9d0bd2b51ef11acd80b2f51587712c7501d9f9b8fff28367d
SHA512ec2d4905357d828e2459abab8b813e5716268ec1b0a4ca550238a71501f450d2d1aafb165569f5aa357ad4e8edc05488f79637951d675574017c3de07c9caadf