Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 16:37
Behavioral task
behavioral1
Sample
JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe
-
Size
185KB
-
MD5
603b93d3a8ca162e656d66116cdad792
-
SHA1
7f62616012c36d6a1bd121e77869071239d72a87
-
SHA256
5945103c45c1ed26f7e3274a8addb1ae95a12d4e88ae2e526714820a0b215218
-
SHA512
9d80ddee599491735b0a7939088ea190d12a0ae150d1329e2f051ac05849fabca2d3fca017f630383f69a43791dc1d8a1efa55b8046c97e39718d7dab915d851
-
SSDEEP
3072:DVa/B5BBu+bcxBbe+DJkHNDyya/B5BBu+bcxBbe+DJkHNDy1tyk:yr0bxFnDJ8+r0bxFnDJ8Qtb
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/3496-0-0x0000000000400000-0x0000000000430000-memory.dmp family_gh0strat behavioral2/memory/3496-4-0x0000000000400000-0x0000000000430000-memory.dmp family_gh0strat behavioral2/files/0x000c000000023c16-3.dat family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\07060001\Parameters\ServiceDll = "C:\\Windows\\system32\\240620156.dll" JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe -
Deletes itself 1 IoCs
pid Process 4544 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 4544 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\240620156.dll JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_603b93d3a8ca162e656d66116cdad792.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3496
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD51547100466e569890a38794e4a322978
SHA1ac75988a8fc7af1542415e97496134c246968689
SHA256cb1e247342944e85be045f877be1154e176ba8d90880e297f63bd7d873cb149c
SHA51225340c9aa2d93a2c9aa53cc947a8cbe63a47b51e8b50f8ed55365acafc9c055fce1a2c8ddcf133a33e757c97afe88fbedb9f587751d4aad69e46c1f8af694b28