Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe
-
Size
94KB
-
MD5
6094f5dcadc9e0131ef88e136857e8b4
-
SHA1
b488ceb6bbf0ec3eb9eac179aba1860ed619dfe8
-
SHA256
52b931c8114b0190c0789eea3eb6714e3faf86a80f1ee295dd958a70ce7f4da2
-
SHA512
15626b4291490a0e8109ac8fc3457844d8129ff5b8d92afcb6605e612c881b4f5bf1af2c7ca9e6ceb488d3686630f39f440e574df22a2bce1e66e96c3cf7c01c
-
SSDEEP
1536:pnJFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prGwdn+:pnfS4jHS8q/3nTzePCwNUh4E9G8+
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000018b68-21.dat family_gh0strat behavioral1/memory/2528-23-0x0000000000400000-0x000000000044C60F-memory.dmp family_gh0strat behavioral1/memory/2472-26-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2472-28-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 2528 fsfdkygutl -
Executes dropped EXE 1 IoCs
pid Process 2528 fsfdkygutl -
Loads dropped DLL 3 IoCs
pid Process 1508 JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe 1508 JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe 2472 svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\nyfbepxjpd svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fsfdkygutl Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2528 fsfdkygutl 2472 svchost.exe 2472 svchost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 2528 fsfdkygutl Token: SeBackupPrivilege 2528 fsfdkygutl Token: SeBackupPrivilege 2528 fsfdkygutl Token: SeRestorePrivilege 2528 fsfdkygutl Token: SeBackupPrivilege 2472 svchost.exe Token: SeRestorePrivilege 2472 svchost.exe Token: SeBackupPrivilege 2472 svchost.exe Token: SeBackupPrivilege 2472 svchost.exe Token: SeSecurityPrivilege 2472 svchost.exe Token: SeSecurityPrivilege 2472 svchost.exe Token: SeBackupPrivilege 2472 svchost.exe Token: SeBackupPrivilege 2472 svchost.exe Token: SeSecurityPrivilege 2472 svchost.exe Token: SeBackupPrivilege 2472 svchost.exe Token: SeBackupPrivilege 2472 svchost.exe Token: SeSecurityPrivilege 2472 svchost.exe Token: SeBackupPrivilege 2472 svchost.exe Token: SeRestorePrivilege 2472 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2528 1508 JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe 30 PID 1508 wrote to memory of 2528 1508 JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe 30 PID 1508 wrote to memory of 2528 1508 JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe 30 PID 1508 wrote to memory of 2528 1508 JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\users\admin\appdata\local\fsfdkygutl"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6094f5dcadc9e0131ef88e136857e8b4.exe" a -sc:\users\admin\appdata\local\temp\jaffacakes118_6094f5dcadc9e0131ef88e136857e8b4.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.0MB
MD5046dfc3969a482b4047022ea57a4519c
SHA13ed13c91f028d48a7e00776512a8834da15d4fff
SHA256d0be37e65084b20a4267ef0ff53239dfb5bac1c326f57bd2ba22c0a23c7c9c3f
SHA51200129308423d92b1d7a4cfc1dc77eed2c7e8c8f30462552535a826962159b119905bc919b7b70ae33ec9fef2bf0ef89a4262dd19303d18adb6868780d3936388
-
Filesize
19.7MB
MD51501b963af603ea74ff828df3b14d5b2
SHA1969981f7c926519ff5a4fc66bdcc316960171bad
SHA2568d92dd0476072155f4cab84cc46e6d6308d960651103c01b80f70df7a92cdb46
SHA5123861222c4e8f6f2aae4318ed865fa8e262e64d64ec020357f5fd5038b0c8ee95f3e98e5146749d8ce0f589c0fac76c4c644bda837d496a2574ada3c9fe45f2e4