Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
eaa4804cf595abd23c4343178368c9d9
-
SHA1
6d6af8927b47253c93e5a6f82857fa1616726cd0
-
SHA256
a46c6633047d02e9068788cf0305cc96cdd75725a9742d1cca990ebdb4f41d07
-
SHA512
affc8f30e894b170f54d7fd15479ca6d57869d33cf6ee50b3f8d74241674c5721a61ba78e454f87664feffb2ae1b34c4b43a64e6e4d836439283af84ceb8250b
-
SSDEEP
49152:9mfXbxiXPa3+waGrmuwo2jGKeg5Ej3D9bKcDPYloUo:0XbxyPaR2jG/cEjT4S
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2596-17-0x0000000004790000-0x000000000482C000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-25-0x00000000022B0000-0x000000000234A000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-29-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-31-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-35-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-37-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-39-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-45-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-51-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-53-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-55-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-63-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-61-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-69-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-71-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-73-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-75-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-79-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-81-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-85-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-87-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-89-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-83-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-77-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-67-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-65-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-59-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-57-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-49-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-47-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-43-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-41-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-33-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-27-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-26-0x00000000022B0000-0x0000000002344000-memory.dmp family_zgrat_v1 -
Detects Echelon Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2316-1-0x0000000001340000-0x000000000182C000-memory.dmp family_echelon behavioral1/memory/2316-20-0x0000000001340000-0x000000000182C000-memory.dmp family_echelon -
Executes dropped EXE 1 IoCs
Processes:
Decoder.exepid process 2596 Decoder.exe -
Loads dropped DLL 1 IoCs
Processes:
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exepid process 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org 7 freegeoip.app 8 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exepid process 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Decoder.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Decoder.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Decoder.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2704 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Decoder.exepid process 2596 Decoder.exe 2596 Decoder.exe 2596 Decoder.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exeDecoder.exedescription pid process Token: SeDebugPrivilege 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe Token: SeDebugPrivilege 2596 Decoder.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exepid process 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.execmd.exedescription pid process target process PID 2316 wrote to memory of 2596 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe Decoder.exe PID 2316 wrote to memory of 2596 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe Decoder.exe PID 2316 wrote to memory of 2596 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe Decoder.exe PID 2316 wrote to memory of 2596 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe Decoder.exe PID 2316 wrote to memory of 2548 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 2548 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 2548 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 2548 2316 eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe cmd.exe PID 2548 wrote to memory of 2704 2548 cmd.exe timeout.exe PID 2548 wrote to memory of 2704 2548 cmd.exe timeout.exe PID 2548 wrote to memory of 2704 2548 cmd.exe timeout.exe PID 2548 wrote to memory of 2704 2548 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaa4804cf595abd23c4343178368c9d9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\ProgramData\Decoder.exe"C:\ProgramData\Decoder.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.cmd""2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
199B
MD50286659a84f7eaf401134ed5150b9114
SHA12e51c1e2f594a1b91b56435c572682858d6948ea
SHA25630de514f410cdba1ce3066001888a3f9074ebd0e3ee7863aca4fb84928414d5d
SHA5120afd957d720b63e51284fa2633141e9a514b97f2fc7aec880a3d6f1ab12bfead9bb19c440be5a562b43fbecc8cfd41e1b4694e2a6dc72f744ca147cad318e0e8
-
Filesize
28B
MD5217407484aac2673214337def8886072
SHA10f8c4c94064ce1f7538c43987feb5bb2d7fec0c6
SHA256467c28ed423f513128575b1c8c6674ee5671096ff1b14bc4c32deebd89fc1797
SHA5128466383a1cb71ea8b049548fd5a41aaf01c0423743b886cd3cb5007f66bff87d8d5cfa67344451f4490c8f26e4ebf9e306075d5cfc655dc62f0813a456cf1330
-
Filesize
490KB
MD5c29c0d495ed13e703f433d53bdffdab8
SHA174ed36e6b6027b61abcfe2956670ffd9de7fd71a
SHA25620309707aa6fc678963aace7685a37839d439c850b1ba399bdbfbbeddc10ed4b
SHA512fea4c1066ee6df3ebb29a354678a3d0f1398cd216b92b261296fcff580b00e19cefe24d975beebcc41854cceef3df2702d569811358dae4203a924fb52cf5426