Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12-04-2024 03:02

General

  • Target

    eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe

  • Size

    911KB

  • MD5

    eefa3dd3a36a5decba3c42072ef0798e

  • SHA1

    a51f4f499fc618b9dc36e079258ed3c087e2bae5

  • SHA256

    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

  • SHA512

    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

  • SSDEEP

    12288:bJmWMzH+hB/pzxJi3X3+b6umJBDARbeqTJgRGL1xPJH1gOk2jNdgx8qNUn3PHMO:TLpXk+b6umJBDAJeqtgR8XN1g4EO

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName youtube.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2864
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2760
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName facebook.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2676
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName outlook.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3036
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName bing.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1568
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2724
    • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
      2⤵
        PID:612
      • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
        2⤵
          PID:2936
        • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
          2⤵
            PID:1040
          • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
            C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
            2⤵
              PID:308
            • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
              C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
              2⤵
                PID:1204
              • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                2⤵
                  PID:2004
                • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                  C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                  2⤵
                    PID:2020
                  • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                    C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                    2⤵
                      PID:768
                    • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                      C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                      2⤵
                      • UAC bypass
                      • Windows security bypass
                      • Windows security modification
                      • Checks whether UAC is enabled
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      • System policy modification
                      PID:988
                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                        3⤵
                          PID:1960
                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
                          3⤵
                          • Adds policy Run key to start application
                          • Adds Run key to start application
                          • Suspicious use of SetWindowsHookEx
                          PID:1672
                          • C:\Windows\SysWOW64\notepad.exe
                            notepad.exe
                            4⤵
                            • Deletes itself
                            PID:2932

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                      Filesize

                      7KB

                      MD5

                      96eefb5a06125f06011190963e524e3e

                      SHA1

                      78249fea1b39f607c47bdc5b187d92ef83f91d50

                      SHA256

                      c7254beb881c3ff0f433cdff3981f03d84250a88a1d5436e048570bc19b42ce6

                      SHA512

                      237765a2a8513efc1b98d7d39994357ca4ba217ec3695078c09e5db90f54f7a0bed6ed14686f8be39062dc955e2f34f918b0c9f8fc1a4c7918db5111a0d28269

                    • memory/988-175-0x0000000000400000-0x000000000042C000-memory.dmp

                      Filesize

                      176KB

                    • memory/988-165-0x0000000000400000-0x000000000042C000-memory.dmp

                      Filesize

                      176KB

                    • memory/1568-41-0x000000006EEB0000-0x000000006F45B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1568-42-0x000000006EEB0000-0x000000006F45B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1568-40-0x000000006EEB0000-0x000000006F45B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1568-44-0x000000006EEB0000-0x000000006F45B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2676-23-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2676-22-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2676-33-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2724-51-0x000000006F150000-0x000000006F6FB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2724-54-0x000000006F150000-0x000000006F6FB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2724-52-0x000000006F150000-0x000000006F6FB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2724-53-0x0000000002B00000-0x0000000002B40000-memory.dmp

                      Filesize

                      256KB

                    • memory/2760-14-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2760-15-0x00000000029B0000-0x00000000029F0000-memory.dmp

                      Filesize

                      256KB

                    • memory/2760-13-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2760-24-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2864-7-0x00000000001E0000-0x0000000000220000-memory.dmp

                      Filesize

                      256KB

                    • memory/2864-21-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2864-6-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2864-5-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2868-91-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-61-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-50-0x0000000004CC0000-0x0000000004D00000-memory.dmp

                      Filesize

                      256KB

                    • memory/2868-0-0x0000000000160000-0x000000000024A000-memory.dmp

                      Filesize

                      936KB

                    • memory/2868-2-0x0000000004CC0000-0x0000000004D00000-memory.dmp

                      Filesize

                      256KB

                    • memory/2868-162-0x0000000073F30000-0x000000007461E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2868-154-0x00000000046D0000-0x00000000046FE000-memory.dmp

                      Filesize

                      184KB

                    • memory/2868-55-0x0000000007D60000-0x0000000007DBA000-memory.dmp

                      Filesize

                      360KB

                    • memory/2868-56-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-71-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-69-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-75-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-73-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-67-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-65-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-83-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-89-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-87-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-85-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-81-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-79-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-77-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-63-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-43-0x0000000073F30000-0x000000007461E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2868-59-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-57-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-1-0x0000000073F30000-0x000000007461E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2868-93-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-105-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-103-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-117-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-119-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-115-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-113-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-111-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-109-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-107-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-101-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-99-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-97-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/2868-95-0x0000000007D60000-0x0000000007DB5000-memory.dmp

                      Filesize

                      340KB

                    • memory/3036-30-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3036-31-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3036-32-0x00000000029C0000-0x0000000002A00000-memory.dmp

                      Filesize

                      256KB

                    • memory/3036-34-0x000000006F180000-0x000000006F72B000-memory.dmp

                      Filesize

                      5.7MB