Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
fb4e9686e8d934c6e71f69fbf69cbba6
-
SHA1
91b52740a1d9a46bddb568cfc6e9d035c5160b22
-
SHA256
f9c069523cc221dcea4a5b46281e6752ba4a567480b7c81e3a80d369c73b07ff
-
SHA512
36c09106eeaa9bbd452fef2bb8d6dda58e1894f1a54963af4b27f61c73ddbf45bb6c523b10a18a22dce138fb6fa5ffba72a7190c6a9e3c2ff24eaf166ba2f87d
-
SSDEEP
24576:K/86WY0n6q9nXshv7ogKw+/dA1hhLdiIIjE6YdZxua7Fz:nSrqRXshMgushQm6Yjxua7Fz
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/4764-7-0x0000000005810000-0x0000000005886000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-8-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-9-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-11-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-13-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-15-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-17-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-19-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-21-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-23-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-25-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-27-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-29-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-31-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-33-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-35-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-37-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-39-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-41-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-43-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-45-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-47-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-49-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-51-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-53-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-55-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-57-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-59-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-61-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-63-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-65-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-67-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-69-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 behavioral2/memory/4764-71-0x0000000005810000-0x000000000587F000-memory.dmp family_zgrat_v1 -
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 2 IoCs
resource yara_rule behavioral2/memory/5116-2324-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor behavioral2/memory/5116-2378-0x0000000000400000-0x00000000005F7000-memory.dmp family_webmonitor -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation WScript.exe -
resource yara_rule behavioral2/memory/5116-2324-0x0000000000400000-0x00000000005F7000-memory.dmp upx behavioral2/memory/5116-2378-0x0000000000400000-0x00000000005F7000-memory.dmp upx -
Unexpected DNS network traffic destination 8 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 185.141.152.26 Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 1.2.4.8 Destination IP 185.141.152.26 Destination IP 1.2.4.8 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4764 set thread context of 5116 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000_Classes\Local Settings fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 1344 powershell.exe 1344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe Token: SeDebugPrivilege 5116 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe Token: SeDebugPrivilege 1344 powershell.exe Token: SeShutdownPrivilege 5116 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 5116 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2112 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 97 PID 4764 wrote to memory of 2112 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 97 PID 4764 wrote to memory of 2112 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 97 PID 4764 wrote to memory of 5116 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 98 PID 4764 wrote to memory of 5116 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 98 PID 4764 wrote to memory of 5116 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 98 PID 4764 wrote to memory of 5116 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 98 PID 4764 wrote to memory of 5116 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 98 PID 4764 wrote to memory of 5116 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 98 PID 4764 wrote to memory of 5116 4764 fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe 98 PID 2112 wrote to memory of 1344 2112 WScript.exe 99 PID 2112 wrote to memory of 1344 2112 WScript.exe 99 PID 2112 wrote to memory of 1344 2112 WScript.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Zdazrmkyf.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Adobe\Vegas.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
-
C:\Users\Admin\AppData\Local\Temp\fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fb4e9686e8d934c6e71f69fbf69cbba6_JaffaCakes118.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5d7208d15ac113b64589278beda42796c
SHA18989f6676a01a34240ad7f6c275bfdaa0e5836e1
SHA2562d9b6aee07eb1062249ca329f22d5bbeb04dcd5ed40ba06fb53e3e4667f9e41b
SHA5122ad9cf8b3a6f0960e41eb7a12641320338899b6da395e46883caf85d73bd529027bcec252e3eace02cc5a7c91639f94209962f2458188eb965465673929cb57e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82