Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe
-
Size
784KB
-
MD5
158f6d23703e5052c808b162adb7df4b
-
SHA1
16789f0fceaf1d8e36d2b4d310b819ccfa5bc52f
-
SHA256
87a7a6196c52b88f490000ba9e4c65496f73738d1e31c1e5c87038ec4e958c83
-
SHA512
2d758c5bb38f52837a284f7f75e0c9a5479eb627502fdc3fda7bfdf555e889253697a2251375ef91400a99b295ed3cb4511b2feee00d015e39c8e9e8e8d0e07c
-
SSDEEP
12288:P+Yu4qDKQHY9o5OmG1Zhw0JcRgvKOIyG:PvqDHHYkOl+RRIKdv
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/1652-2-0x0000000000300000-0x0000000000320000-memory.dmp family_zgrat_v1 -
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1652-2-0x0000000000300000-0x0000000000320000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\PO = "\\Appdata\\updatedpdf.exe" 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\PO = "C:\\Users\\Admin\\AppData\\Roaming\\Appdata\\updatedpdf.exe" 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1652 set thread context of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1656 set thread context of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2820 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe Token: SeDebugPrivilege 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe Token: SeDebugPrivilege 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe Token: SeDebugPrivilege 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe Token: 33 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1724 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 1652 wrote to memory of 2576 1652 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 28 PID 2576 wrote to memory of 1656 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1656 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1656 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 30 PID 2576 wrote to memory of 1656 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 30 PID 2576 wrote to memory of 2952 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 31 PID 2576 wrote to memory of 2952 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 31 PID 2576 wrote to memory of 2952 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 31 PID 2576 wrote to memory of 2952 2576 158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe 31 PID 2952 wrote to memory of 2820 2952 cmd.exe 33 PID 2952 wrote to memory of 2820 2952 cmd.exe 33 PID 2952 wrote to memory of 2820 2952 cmd.exe 33 PID 2952 wrote to memory of 2820 2952 cmd.exe 33 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36 PID 1656 wrote to memory of 1724 1656 158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:2820
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD55d660ca6c69d442fdd1a2a0167cfc608
SHA15ad668807ee6f01dc2176029c7b2e6187a9b659e
SHA2564efd7a6fcb8fcecd08e19f8693c182c1742d7ef268d3a4800e2a83b05aef8bf5
SHA5128abafe1e172d3341121c732493e1b67348805cf635b1157de81f5075a2123318fc2eaa1fdcb99efbf7231c3b39ec8afadd0525a1f6e321104adf5721e66c6c08
-
\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe
Filesize784KB
MD5158f6d23703e5052c808b162adb7df4b
SHA116789f0fceaf1d8e36d2b4d310b819ccfa5bc52f
SHA25687a7a6196c52b88f490000ba9e4c65496f73738d1e31c1e5c87038ec4e958c83
SHA5122d758c5bb38f52837a284f7f75e0c9a5479eb627502fdc3fda7bfdf555e889253697a2251375ef91400a99b295ed3cb4511b2feee00d015e39c8e9e8e8d0e07c