Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 14:34
General
-
Target
JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe
-
Size
172KB
-
MD5
9ad7ce8b3d0c6aa510e603d30d19970f
-
SHA1
ab6bf3d741da6f717c5b02f7126d968d0031448e
-
SHA256
45816da3f542db9f600cd66d2dfd68e6d76eb8dd617470a8998e43c34e9d82cb
-
SHA512
ad4e31afe13a43c87dd520b5ca7d65f6dfc06d531087c4ea9ca32592346b34d867c59d065cf0d0c254e1fe64343a4acda54a6c9857ed1af00a4412da501c2789
-
SSDEEP
3072:wNoxFCSKntzbcvf4KFnXMk7TGL69ire0YukcEfUE868Q:eCCboVXMot9grYukFfL86
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x00050000000227be-2.dat family_gh0strat behavioral1/files/0x000c00000002409d-11.dat family_gh0strat -
Gh0strat family
-
Deletes itself 1 IoCs
pid Process 4072 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe 4072 svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\FileName.jpg JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe File created C:\windows\temp2009400.dll JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe File opened for modification C:\Windows\FileName.jpg JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe Token: SeRestorePrivilege 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe Token: SeBackupPrivilege 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe Token: SeRestorePrivilege 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe Token: SeBackupPrivilege 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe Token: SeRestorePrivilege 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe Token: SeBackupPrivilege 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe Token: SeRestorePrivilege 4624 JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9ad7ce8b3d0c6aa510e603d30d19970f.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD507d0ab958f9c3107d4e961f07e64745e
SHA1a8be8260992e903fbdc45a3d97ebe64591632b17
SHA256eac7795a5869541a5ae163f93e2b7cfcd4fdb6b2f990b94980376223d73699bb
SHA512cad8b9108b45fca56df64a5bfdb3c8b041c947d0cdb472416a32d723161cca3eff2e9f994bb0d7992f217e38dc7f9f9801e140a05cf5ae50ced7c56f1edeb7b7
-
Filesize
111B
MD55b171e43da60b0a5cef2b4bb2caeb6b7
SHA142f36a1397daefee8eff1dcffe7bfacd3a0b4206
SHA2568b3ac8b1df997428e69a023fd0c4c9c390e51ca9c460caaa117634598009ac81
SHA512f7c6fa6526163e01b1c9f4cc9dea6e92e41a7a8edbd3a2e47fbe00e959f28c488d53031bdf56f090e741a6097d6d68b5efe72162935462ae8ad585acc66f0534
-
Filesize
7.5MB
MD51481c8efb308af5524eacc8b5a21dc0a
SHA1bc075155f1d73538f521cc8d7bcb767f6b87f7f9
SHA25633ddec21fedf55ff0d475d6a69da4fc07100855869e504e357796da55a801149
SHA512eb9097a0e27e4addeefeb465d4891f5d038271348f26832af37e0253d996c20072adf03e6816b032225cb06cec3b29e14b0d6e93734d7cf6c4ac74bcdd64ede1