Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe
-
Size
5.1MB
-
MD5
22cff880fa28e4de8a2b3cfe8e4167ac
-
SHA1
4fe818c809011d0105b4199fe10c5843d6b892f3
-
SHA256
4a37ef0832eff0801ea4c2bcd4c544d70aa91685fa2d0e18d9f382956ba9b212
-
SHA512
50760946e9ee30688db36b1e7dc702a3a15f09e09cd62ca7ccc9e1dfc165c841fa2d1947bb9c9d6f866c87944e20658b4c7a0dfc05ae97a63cc533a6cdb8b06b
-
SSDEEP
98304:016BpLto6+8GmggciWjsMfdIfabcAhScW8GJ1plxuemt3uQZ13kXUUXx1sXgzcms:k6+8kgciUsMfd0APWF1ceK1T3k5XswW
Malware Config
Signatures
-
Detect ZGRat V1 6 IoCs
resource yara_rule behavioral1/memory/2292-7-0x00000000004E0000-0x00000000004F4000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-18-0x0000000000400000-0x000000000042A000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-23-0x0000000000400000-0x000000000042A000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-20-0x0000000000400000-0x000000000042A000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-14-0x0000000000400000-0x000000000042A000-memory.dmp family_zgrat_v1 behavioral1/memory/2368-12-0x0000000000400000-0x000000000042A000-memory.dmp family_zgrat_v1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2292 set thread context of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31 PID 2292 wrote to memory of 2368 2292 22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22cff880fa28e4de8a2b3cfe8e4167ac_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2368
-