Analysis

  • max time kernel
    130s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-03-2024 07:35

General

  • Target

    50bc873b8e08fdc5832350f377a1b5a7_JaffaCakes118.exe

  • Size

    569KB

  • MD5

    50bc873b8e08fdc5832350f377a1b5a7

  • SHA1

    868d150864b3a467238314be1d21a4835fed7c68

  • SHA256

    2ac9fe88102fbe8cc50d40228e302e2f37fcc006009697609eb5d55aab5c940e

  • SHA512

    842b38e394e2b6ef46b2d797a036b52b7ff06c2d3ea3489d9bcbaa8325659c2cffb8714a2ec12c4378a66ddcc19a5ef3fedde0e7ae0e829de1abe6809d12d163

  • SSDEEP

    6144:PC4w8juap56y9dg4sIo9ZCf6YRZDYooV3FtlyPG4wYeVKiEgQaratgMZ:Knapvg4sz9dYRZsx1tvpEVar3MZ

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

1

C2

185.157.160.136:1973

Mutex

df4Rtg34dFjwr7ujp3

Attributes
  • delay

    38

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50bc873b8e08fdc5832350f377a1b5a7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\50bc873b8e08fdc5832350f377a1b5a7_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:2540
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
          PID:2672

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2672-4-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/2672-8-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/2672-6-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/2672-9-0x0000000074870000-0x0000000074F5E000-memory.dmp
        Filesize

        6.9MB

      • memory/2672-10-0x0000000074870000-0x0000000074F5E000-memory.dmp
        Filesize

        6.9MB

      • memory/2672-11-0x0000000005060000-0x00000000050A0000-memory.dmp
        Filesize

        256KB

      • memory/2672-12-0x0000000005060000-0x00000000050A0000-memory.dmp
        Filesize

        256KB