Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 19:36
Behavioral task
behavioral1
Sample
JaffaCakes118_60ff0ccfdef6358be11bc6acbebdc7b0.dll
Resource
win7-20240903-en
6 signatures
150 seconds
General
-
Target
JaffaCakes118_60ff0ccfdef6358be11bc6acbebdc7b0.dll
-
Size
118KB
-
MD5
60ff0ccfdef6358be11bc6acbebdc7b0
-
SHA1
aa001740b80a74ecc257c29a9a10ad6238d8e5d9
-
SHA256
ddc2405ccf3db519e801b02c8e429bff0f6387b199ff8295203a6905cd9a8bb8
-
SHA512
fa0fb5f2705e5ed4e8c6ee0cd05aa04a9500d96c329cf545787b5dd1134173c640400457ea0ca0d909ee1bdc3412340e352762050bdd68c2cc49ec0f1551c69a
-
SSDEEP
3072:BTCYsojaj3i9dAnaQ6PTSmKHDHndGJXxMayNQtrfbc4Wn:BTCYsH+waQmKjHnuSaKsrbGn
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2124-1-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2124-0-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2124-2-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat behavioral1/memory/2124-5-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Gh0strat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2124 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2124 3044 rundll32.exe 31 PID 3044 wrote to memory of 2124 3044 rundll32.exe 31 PID 3044 wrote to memory of 2124 3044 rundll32.exe 31 PID 3044 wrote to memory of 2124 3044 rundll32.exe 31 PID 3044 wrote to memory of 2124 3044 rundll32.exe 31 PID 3044 wrote to memory of 2124 3044 rundll32.exe 31 PID 3044 wrote to memory of 2124 3044 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60ff0ccfdef6358be11bc6acbebdc7b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60ff0ccfdef6358be11bc6acbebdc7b0.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2124
-