Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-04-2024 03:02

General

  • Target

    eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe

  • Size

    911KB

  • MD5

    eefa3dd3a36a5decba3c42072ef0798e

  • SHA1

    a51f4f499fc618b9dc36e079258ed3c087e2bae5

  • SHA256

    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

  • SHA512

    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

  • SSDEEP

    12288:bJmWMzH+hB/pzxJi3X3+b6umJBDARbeqTJgRGL1xPJH1gOk2jNdgx8qNUn3PHMO:TLpXk+b6umJBDAJeqtgR8XN1g4EO

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName youtube.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2776
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1100
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName facebook.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3636
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName outlook.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:212
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName bing.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:404
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3100
    • C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
      2⤵
      • UAC bypass
      • Windows security bypass
      • Windows security modification
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2992
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        C:\Users\Admin\AppData\Local\Temp\eefa3dd3a36a5decba3c42072ef0798e_JaffaCakes118.exe
        3⤵
        • Adds policy Run key to start application
        • Adds Run key to start application
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3696
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          4⤵
          • Deletes itself
          PID:4780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    6832ae680e8ddacc9752c84ff4ee94d5

    SHA1

    eba38e3a46f6a27ec29c567c6766ba57fe7954ba

    SHA256

    19c4f3bc855b449022b1baf50569236e2d844e3f323453291495de125f76e632

    SHA512

    9cea7dcd3b0bf6bb6c1fd15aea43312cb52926e2e61455fcb26a6dd82323e352b9960f4afe412891be2aba54230ef354772e5397df8c6100e5aab875247fa1ef

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    4dfc4cf6e29e679e7e33f20a78a44924

    SHA1

    ee6a2df9efcc4ae70b896f7a498b75d5032ad74c

    SHA256

    44c9d00c914783cd7168f12f50628d936c07964449051a2e582b49946b1f0549

    SHA512

    f21233f2fb0f891d9d2fce8cc89c8bf5d44ec9c8e46c4751c25fb39effd22a219c0d4b4259191ec34f0ea3e89ab138262b4456633f926d0123e970e2105b8444

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    8da66ef0fa38c048096d08c341447d03

    SHA1

    9e517cd043300c581fb6ab6954a7364a257c5b39

    SHA256

    cb65334142c18890d1455b49276f5d8e7a8031f2d3a5448b706fde94ac53edbe

    SHA512

    5fb61ac16678a5508c593a639f74d20239e64b82ce3db138e03b27152b76729f56507145eb63643b3142990c30259912c00abed8e20a8242716d836315a05c2a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    2d2b455c6a8237ce2aaee586cdacc62c

    SHA1

    efa0fe319afed0120c9288359b9c9cf2c0506b82

    SHA256

    bb5d4ac648c15d3b980cdfb864695aeb41a022d03845912c54f203e15c214fba

    SHA512

    09fd7aeb6da862bf76b501639f98bad618e0a012d1728d0d8533a247bbbd2c56e9a859a736dc1dcd0990ab9aee51b0bdb57b56aea53bb708163e0a7a2eb5fc06

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    19KB

    MD5

    9b76f98cd589de607d62509ef4ad2b28

    SHA1

    3c184892aac8cd6fd381f1fd3f45e81d96de659b

    SHA256

    61ad8ba902292f9cc5c3d8ad6346a73989db9657a6b6f9b4c55a48a752aac853

    SHA512

    69e108abdaf7bdb019f4f7f2eab060936242b9019bf3a88ffd7a7e8c1c01bf92961fad3fdb23e6675d743ca609936a6764b1db6d1411e3a9fd1bd6a82ac19b88

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4i3xik4n.vmm.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/212-77-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/212-59-0x0000000002EA0000-0x0000000002EB0000-memory.dmp

    Filesize

    64KB

  • memory/212-58-0x0000000002EA0000-0x0000000002EB0000-memory.dmp

    Filesize

    64KB

  • memory/212-57-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/404-78-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/404-79-0x0000000004870000-0x0000000004880000-memory.dmp

    Filesize

    64KB

  • memory/404-80-0x0000000004870000-0x0000000004880000-memory.dmp

    Filesize

    64KB

  • memory/404-93-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/516-156-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-216-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/516-166-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-158-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-160-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-164-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-162-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-136-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-154-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-0-0x0000000000FC0000-0x00000000010AA000-memory.dmp

    Filesize

    936KB

  • memory/516-138-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-140-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-152-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-142-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-168-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-170-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-174-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-172-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-209-0x0000000006DB0000-0x0000000006E26000-memory.dmp

    Filesize

    472KB

  • memory/516-144-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-210-0x0000000006F80000-0x0000000006FAE000-memory.dmp

    Filesize

    184KB

  • memory/516-150-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-211-0x00000000070B0000-0x00000000070CE000-memory.dmp

    Filesize

    120KB

  • memory/516-132-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-5-0x0000000005C00000-0x0000000005C0A000-memory.dmp

    Filesize

    40KB

  • memory/516-4-0x0000000005C40000-0x0000000005C50000-memory.dmp

    Filesize

    64KB

  • memory/516-3-0x0000000005A60000-0x0000000005AF2000-memory.dmp

    Filesize

    584KB

  • memory/516-81-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/516-2-0x0000000005F70000-0x0000000006514000-memory.dmp

    Filesize

    5.6MB

  • memory/516-104-0x0000000005C40000-0x0000000005C50000-memory.dmp

    Filesize

    64KB

  • memory/516-146-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-148-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-134-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-1-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/516-116-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-110-0x0000000006C90000-0x0000000006CEA000-memory.dmp

    Filesize

    360KB

  • memory/516-111-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-114-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-112-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-126-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-124-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-122-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-128-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-120-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-130-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/516-118-0x0000000006C90000-0x0000000006CE5000-memory.dmp

    Filesize

    340KB

  • memory/1100-31-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/1100-71-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/1100-30-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/1100-32-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2776-10-0x0000000004D30000-0x0000000005358000-memory.dmp

    Filesize

    6.2MB

  • memory/2776-24-0x0000000005C50000-0x0000000005C6E000-memory.dmp

    Filesize

    120KB

  • memory/2776-6-0x00000000046C0000-0x00000000046F6000-memory.dmp

    Filesize

    216KB

  • memory/2776-55-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/2776-7-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/2776-8-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/2776-9-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/2776-29-0x0000000007EC0000-0x000000000853A000-memory.dmp

    Filesize

    6.5MB

  • memory/2776-11-0x0000000004CB0000-0x0000000004CD2000-memory.dmp

    Filesize

    136KB

  • memory/2776-28-0x00000000061B0000-0x00000000061D2000-memory.dmp

    Filesize

    136KB

  • memory/2776-27-0x0000000006160000-0x000000000617A000-memory.dmp

    Filesize

    104KB

  • memory/2776-26-0x0000000006C40000-0x0000000006CD6000-memory.dmp

    Filesize

    600KB

  • memory/2776-25-0x0000000005D00000-0x0000000005D4C000-memory.dmp

    Filesize

    304KB

  • memory/2776-17-0x0000000005490000-0x00000000054F6000-memory.dmp

    Filesize

    408KB

  • memory/2776-23-0x0000000005890000-0x0000000005BE4000-memory.dmp

    Filesize

    3.3MB

  • memory/2776-22-0x0000000005600000-0x0000000005666000-memory.dmp

    Filesize

    408KB

  • memory/2992-217-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2992-227-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3100-106-0x0000000005330000-0x0000000005340000-memory.dmp

    Filesize

    64KB

  • memory/3100-109-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/3100-94-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/3100-105-0x0000000006300000-0x0000000006654000-memory.dmp

    Filesize

    3.3MB

  • memory/3636-74-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/3636-42-0x0000000074990000-0x0000000075140000-memory.dmp

    Filesize

    7.7MB

  • memory/3636-43-0x0000000004AA0000-0x0000000004AB0000-memory.dmp

    Filesize

    64KB