Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6085461eafb3302687d89eca1e516682.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6085461eafb3302687d89eca1e516682.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6085461eafb3302687d89eca1e516682.exe
-
Size
195KB
-
MD5
6085461eafb3302687d89eca1e516682
-
SHA1
2397c245535bb9e1601db254dd4d97dd0891b3c1
-
SHA256
c47426d3a861145f57205de7a8ba0992e0bb6faa94c918ed7ac2a61d7c4032e7
-
SHA512
ad62ab2b8e17add04b93a29003a8506f62c963659bdfa16c350eddb8d24514f1722da5a15abba3c756ed2793ca38ce14ed2deb1688f01530f23491844369aa58
-
SSDEEP
3072:j/cLWSvOrVsWT1wsLaU1ODuI8Jb8oBNw/4jOYpIMA3my:j/OWSvOOW2sLaU1OCtJ4sI4jOMKmy
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2372-17-0x0000000000400000-0x0000000000432000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2372 hwuuvoogjj -
Executes dropped EXE 1 IoCs
pid Process 2372 hwuuvoogjj -
Loads dropped DLL 2 IoCs
pid Process 768 JaffaCakes118_6085461eafb3302687d89eca1e516682.exe 768 JaffaCakes118_6085461eafb3302687d89eca1e516682.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6085461eafb3302687d89eca1e516682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hwuuvoogjj -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 hwuuvoogjj -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2372 hwuuvoogjj Token: SeBackupPrivilege 2372 hwuuvoogjj Token: SeBackupPrivilege 2372 hwuuvoogjj Token: SeRestorePrivilege 2372 hwuuvoogjj -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 768 wrote to memory of 2372 768 JaffaCakes118_6085461eafb3302687d89eca1e516682.exe 30 PID 768 wrote to memory of 2372 768 JaffaCakes118_6085461eafb3302687d89eca1e516682.exe 30 PID 768 wrote to memory of 2372 768 JaffaCakes118_6085461eafb3302687d89eca1e516682.exe 30 PID 768 wrote to memory of 2372 768 JaffaCakes118_6085461eafb3302687d89eca1e516682.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6085461eafb3302687d89eca1e516682.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6085461eafb3302687d89eca1e516682.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
\??\c:\users\admin\appdata\local\hwuuvoogjj"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6085461eafb3302687d89eca1e516682.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_6085461eafb3302687d89eca1e516682.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\svchost.exEC:\Windows\SysWOW64\svchost.exE -k ???s????h1⤵PID:2936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k regsvc1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.9MB
MD540b250bb626b22492ee161902446c1e9
SHA179a2698aacd3242133e8447fa905ebadaa0448a5
SHA25616c762c9623b51ba1daa1cdfe4aa7b145a128ed73b6d3ab8d7066f6848ff18b4
SHA51223cc644d54aa731d69cbebeee1a533757c280359bae063f84f3fdeb1d9777a2fb8657e210e0f30e5b48ae9828ba6538b8fdffe4938273a87a4cb2f3b8dc133f1