Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2024 21:15

General

  • Target

    194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe

  • Size

    463KB

  • MD5

    194961e6ef4f3310336d23d78cb7357c

  • SHA1

    2f016cd2b88b716fad0b1352abda350aa567004f

  • SHA256

    6b01e64b3574a313f2f8e1e42ce93b5444a3e99d66138aebddf7c3e3b81c601d

  • SHA512

    517218b0fc5b530a32974f3eb34f78c533b86cade7965739084d2ddec001b0d3dd8e40d23397f471664e43677ac772befc490df10adfb91a231dd3e893f026d5

  • SSDEEP

    6144:AnSbvnbjUwnkx1kcw3llt8ix50Ki1asiBKFABnyYwRXiO73knJxH4:A8DEkL8obnmi0kJ54

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Delete /tn NYANP /F
        3⤵
          PID:8
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe" /sc minute /mo 5
          3⤵
          • Creates scheduled task(s)
          PID:4236
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Delete /tn NYAN /F
          3⤵
            PID:2472
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe" /sc minute /mo 1
            3⤵
            • Creates scheduled task(s)
            PID:1864
      • C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe
        1⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1976
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Delete /tn NYANP /F
            3⤵
              PID:1520
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe" /sc minute /mo 5
              3⤵
              • Creates scheduled task(s)
              PID:2088
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Delete /tn NYAN /F
              3⤵
                PID:3180
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe" /sc minute /mo 1
                3⤵
                • Creates scheduled task(s)
                PID:3696
          • C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe
            C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe
            1⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4492
            • C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1820
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /Delete /tn NYANP /F
                3⤵
                  PID:512
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn NYANP /tr "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe" /sc minute /mo 5
                  3⤵
                  • Creates scheduled task(s)
                  PID:5044
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Delete /tn NYAN /F
                  3⤵
                    PID:664
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe" /sc minute /mo 1
                    3⤵
                    • Creates scheduled task(s)
                    PID:3556

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Execution

              Scheduled Task/Job

              1
              T1053

              Persistence

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Privilege Escalation

              Boot or Logon Autostart Execution

              1
              T1547

              Registry Run Keys / Startup Folder

              1
              T1547.001

              Scheduled Task/Job

              1
              T1053

              Defense Evasion

              Modify Registry

              1
              T1112

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\194961e6ef4f3310336d23d78cb7357c_JaffaCakes118.exe.log
                Filesize

                1KB

                MD5

                8ec831f3e3a3f77e4a7b9cd32b48384c

                SHA1

                d83f09fd87c5bd86e045873c231c14836e76a05c

                SHA256

                7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

                SHA512

                26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

              • memory/3596-60-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-34-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-295-0x0000000075230000-0x00000000759E0000-memory.dmp
                Filesize

                7.7MB

              • memory/3596-62-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-293-0x0000000075230000-0x00000000759E0000-memory.dmp
                Filesize

                7.7MB

              • memory/3596-16-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-18-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-22-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-24-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-10-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-26-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-13-0x0000000075230000-0x00000000759E0000-memory.dmp
                Filesize

                7.7MB

              • memory/3596-28-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-46-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-48-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-76-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-74-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-72-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-70-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-68-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-66-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-64-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-294-0x0000000075230000-0x00000000759E0000-memory.dmp
                Filesize

                7.7MB

              • memory/3596-20-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-52-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-56-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-54-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-58-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-50-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-44-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-42-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-40-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-38-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-36-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-30-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3596-32-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/4424-2-0x0000000005700000-0x0000000005CA4000-memory.dmp
                Filesize

                5.6MB

              • memory/4424-14-0x0000000075230000-0x00000000759E0000-memory.dmp
                Filesize

                7.7MB

              • memory/4424-1-0x0000000000720000-0x0000000000798000-memory.dmp
                Filesize

                480KB

              • memory/4424-9-0x0000000075230000-0x00000000759E0000-memory.dmp
                Filesize

                7.7MB

              • memory/4424-8-0x000000007523E000-0x000000007523F000-memory.dmp
                Filesize

                4KB

              • memory/4424-0-0x000000007523E000-0x000000007523F000-memory.dmp
                Filesize

                4KB

              • memory/4424-7-0x0000000006350000-0x00000000063EC000-memory.dmp
                Filesize

                624KB

              • memory/4424-6-0x0000000075230000-0x00000000759E0000-memory.dmp
                Filesize

                7.7MB

              • memory/4424-5-0x00000000051E0000-0x00000000051EA000-memory.dmp
                Filesize

                40KB

              • memory/4424-4-0x0000000005150000-0x0000000005170000-memory.dmp
                Filesize

                128KB

              • memory/4424-3-0x00000000051F0000-0x0000000005282000-memory.dmp
                Filesize

                584KB