Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 19:26
Behavioral task
behavioral1
Sample
JaffaCakes118_60f4b008fd9b95b1556f5a284d66b520.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_60f4b008fd9b95b1556f5a284d66b520.dll
-
Size
81KB
-
MD5
60f4b008fd9b95b1556f5a284d66b520
-
SHA1
b7bbf0939753c31adf74292cf1667b575c97af08
-
SHA256
9a617dc74b44dd3b82821e64eb202c8001ec56ea657345cf58c8c1ada83f5e75
-
SHA512
6f67f102aeca4327e47160a42c1d7188f35d7c3ffcef2d6bb4a639b88557e34a6d928eac45df8f2157476f9d90f007dbeaa07f9348169b074595a7c6ccbf4bee
-
SSDEEP
1536:FjLrtt4kwchZDDPVgoLSc+M3tfYU+o5peQgRPu5k8gE+SI7f:FjLRtUc7PBLS1MFYU+nQgRPu5k8gE3ID
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1900-2-0x0000000010000000-0x0000000010018000-memory.dmp family_gh0strat behavioral1/memory/1900-1-0x0000000010000000-0x0000000010018000-memory.dmp family_gh0strat behavioral1/memory/1900-0-0x0000000010000000-0x0000000010018000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1900 1632 rundll32.exe 30 PID 1632 wrote to memory of 1900 1632 rundll32.exe 30 PID 1632 wrote to memory of 1900 1632 rundll32.exe 30 PID 1632 wrote to memory of 1900 1632 rundll32.exe 30 PID 1632 wrote to memory of 1900 1632 rundll32.exe 30 PID 1632 wrote to memory of 1900 1632 rundll32.exe 30 PID 1632 wrote to memory of 1900 1632 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60f4b008fd9b95b1556f5a284d66b520.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60f4b008fd9b95b1556f5a284d66b520.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1900
-