Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 03:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe
Resource
win7-20240319-en
windows7-x64
5 signatures
150 seconds
General
-
Target
f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
f96c6016e4b5a7268755c91a6b11fc35
-
SHA1
69c5707f6f260dbffd451a1eecd99f9150d93554
-
SHA256
e6ce11917223f46147c644fb6f642b90d91fca0c623d5f1b3f6153f8c52d9537
-
SHA512
6a055095e91ee2f0830086853607bcd506e268424225c2d0986a30b795bfb92751190906c7b4c40e05a019fffb9d58c9ff5b98b91d9015c0143acebfb672ee97
-
SSDEEP
49152:YuUJHU37QPg1Iypdo3f03LrCdbc4ml+TM4Zphd0f0:YuUJHUmg1IGdo38rMBw+TMd0
Malware Config
Signatures
-
SectopRAT payload 17 IoCs
resource yara_rule behavioral2/memory/116-3-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-4-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-11-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-12-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-13-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-15-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-18-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-19-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-20-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-21-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-22-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-23-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-24-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-25-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-26-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-27-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat behavioral2/memory/116-28-0x00000000009E0000-0x000000000130E000-memory.dmp family_sectoprat -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 116 f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f96c6016e4b5a7268755c91a6b11fc35_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:116