Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 16:44
Behavioral task
behavioral1
Sample
JaffaCakes118_6043ed75abcec29763903b1d0bbc6ad0.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6043ed75abcec29763903b1d0bbc6ad0.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6043ed75abcec29763903b1d0bbc6ad0.dll
-
Size
117KB
-
MD5
6043ed75abcec29763903b1d0bbc6ad0
-
SHA1
315c187ec61bc8cc94cbacd22a45b145d94919c1
-
SHA256
1e7e41220c29dbad04cf2b48ccc303d81bbffaad62d15c9d1dabc7674058c3e6
-
SHA512
5b6d28abf448e2e2498a1736f0843fcaac7517c144295904099e5c49a4366354c519dae5e9fe9d88398a046a9138232cfc4ea6e096c1f6563f93dc625dad62ed
-
SSDEEP
1536:xNY14eZoAb++Eb8B9+WO9DceTyfDvqqSQz/EvgiVf/LcgyYu:M14eZZCZ8B9NO9DJTEDvq0/EI4f/ogu
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2344-1-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/memory/2344-0-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/memory/1740-2-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/memory/2220-5-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/memory/2220-4-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/memory/2220-3-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/memory/2220-6-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat behavioral1/memory/1740-7-0x0000000010000000-0x0000000010024000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_6043ed75abcec29763903b1d0bbc6ad0.dll" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1740 svchost.exe Token: SeDebugPrivilege 2220 rundll32.exe Token: SeDebugPrivilege 2220 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1440 wrote to memory of 2344 1440 rundll32.exe 30 PID 1740 wrote to memory of 2220 1740 svchost.exe 32 PID 1740 wrote to memory of 2220 1740 svchost.exe 32 PID 1740 wrote to memory of 2220 1740 svchost.exe 32 PID 1740 wrote to memory of 2220 1740 svchost.exe 32 PID 1740 wrote to memory of 2220 1740 svchost.exe 32 PID 1740 wrote to memory of 2220 1740 svchost.exe 32 PID 1740 wrote to memory of 2220 1740 svchost.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6043ed75abcec29763903b1d0bbc6ad0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6043ed75abcec29763903b1d0bbc6ad0.dll,#12⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\local\temp\jaffacakes118_6043ed75abcec29763903b1d0bbc6ad0.dll wintest2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2220
-