Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 14:12
Behavioral task
behavioral1
Sample
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe
-
Size
193KB
-
MD5
fcefee6d1fce90af5fa38bc30152ff7d
-
SHA1
80b754cebdb85969c5ebed0efe4774e0555238dc
-
SHA256
0cb826c1238a28e8417beb953789ec9fece0d4572da0941779024f2653b6f83d
-
SHA512
3c1fc34243e914b61db7a95ed6a1026685bae38c3625aed95cb0bb7f6b1b2f9f9510141eb1cc95d6eb0e25c5a3c4f38eb0ebe77f7af16cc8673b117be69b3bcc
-
SSDEEP
3072:rC1LJUgnLKPzB1B9X4RO6wdjAE0pKWfx2/00UVCrprfEo4jFI:ruLmwkBPlwO6QjAVpKu3JVCrpbEtI
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3604-1-0x0000000000400000-0x000000000045A000-memory.dmp family_gh0strat behavioral2/memory/3604-2-0x0000000000400000-0x000000000045A000-memory.dmp family_gh0strat behavioral2/memory/3604-5-0x0000000000400000-0x000000000045A000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral2/memory/3604-0-0x0000000000400000-0x000000000045A000-memory.dmp vmprotect behavioral2/memory/3604-1-0x0000000000400000-0x000000000045A000-memory.dmp vmprotect behavioral2/memory/3604-2-0x0000000000400000-0x000000000045A000-memory.dmp vmprotect behavioral2/memory/3604-5-0x0000000000400000-0x000000000045A000-memory.dmp vmprotect -
Drops file in System32 directory 1 IoCs
Processes:
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exedescription ioc process File created C:\windows\SysWOW64\hunder.pic fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
Processes:
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exedescription ioc process File created C:\windows\Comres.dll fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe File created C:\Windows\Config\servers.exe fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\68A12DE4422589E97E1C6396FE17B5024FE0547A\Blob = 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 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\68A12DE4422589E97E1C6396FE17B5024FE0547A fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exepid process 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exedescription pid process Token: SeBackupPrivilege 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe Token: SeRestorePrivilege 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exedescription pid process target process PID 3604 wrote to memory of 4936 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe cmd.exe PID 3604 wrote to memory of 4936 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe cmd.exe PID 3604 wrote to memory of 4936 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe cmd.exe PID 3604 wrote to memory of 2232 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe cmd.exe PID 3604 wrote to memory of 2232 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe cmd.exe PID 3604 wrote to memory of 2232 3604 fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcefee6d1fce90af5fa38bc30152ff7d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Config\servers.exe C:\windows\system32\hunder.pic YJSOFT2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\FCEFEE~1.EXE > nul2⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3932 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3604-0-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/3604-1-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/3604-2-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/3604-5-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB