Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 15:22
Static task
static1
Behavioral task
behavioral1
Sample
2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe
-
Size
325KB
-
MD5
2578debd234465c8aa7bcdf53bc3858a
-
SHA1
aaec53a7560318b698cec4f1388f26b1c12f9c40
-
SHA256
0f4e7faf833c30ed300efa46b4b1d083523d48ec2864f110d2a2d5b47eb67a72
-
SHA512
849947365c47ab82f54d7e7b6a5105e28bf684cff0ad3f313541722dcc2b0ae9bbdeb794b771a32a07fd6b1f071f2b99e7c8464167aff036a622fc969ce4fcdf
-
SSDEEP
6144:KiMD5bWl4fAAH3gyLBVpRQ7Wm5qRnu1goA:hl4bHQydlQamL/A
Malware Config
Extracted
xpertrat
3.0.10
Group
46.183.220.104:10101
K8P3I007-I4G2-R2U0-V0G8-T1Q3K5W771L5
Signatures
-
Processes:
tmp.exesvhost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svhost.exe -
Processes:
svhost.exetmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" svhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" tmp.exe -
XpertRAT Core payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2384-44-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
Drops startup file 1 IoCs
Processes:
2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.exe.lnk 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
tmp.exesvhost.exepid process 2568 tmp.exe 2936 svhost.exe -
Loads dropped DLL 5 IoCs
Processes:
2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exetmp.exepid process 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe 2568 tmp.exe 2568 tmp.exe 2568 tmp.exe -
Processes:
svhost.exetmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" svhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" tmp.exe -
Processes:
tmp.exesvhost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svhost.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exesvhost.exetmp.exedescription pid process target process PID 2264 set thread context of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2936 set thread context of 2384 2936 svhost.exe iexplore.exe PID 2568 set thread context of 2496 2568 tmp.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2504 timeout.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exetmp.exesvhost.exepid process 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe 2568 tmp.exe 2568 tmp.exe 2936 svhost.exe 2936 svhost.exe 2568 tmp.exe 2568 tmp.exe 2936 svhost.exe 2936 svhost.exe 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exeiexplore.exedescription pid process Token: SeDebugPrivilege 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe Token: 33 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe Token: SeDebugPrivilege 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
svhost.exetmp.exeiexplore.exepid process 2936 svhost.exe 2568 tmp.exe 2384 iexplore.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.execmd.exetmp.exesvhost.execmd.exedescription pid process target process PID 2264 wrote to memory of 2692 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 2692 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 2692 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 2692 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe cmd.exe PID 2692 wrote to memory of 2564 2692 cmd.exe reg.exe PID 2692 wrote to memory of 2564 2692 cmd.exe reg.exe PID 2692 wrote to memory of 2564 2692 cmd.exe reg.exe PID 2692 wrote to memory of 2564 2692 cmd.exe reg.exe PID 2264 wrote to memory of 2568 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe tmp.exe PID 2264 wrote to memory of 2568 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe tmp.exe PID 2264 wrote to memory of 2568 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe tmp.exe PID 2264 wrote to memory of 2568 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe tmp.exe PID 2264 wrote to memory of 2568 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe tmp.exe PID 2264 wrote to memory of 2568 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe tmp.exe PID 2264 wrote to memory of 2568 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe tmp.exe PID 2264 wrote to memory of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2264 wrote to memory of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2264 wrote to memory of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2264 wrote to memory of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2264 wrote to memory of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2264 wrote to memory of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2264 wrote to memory of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2264 wrote to memory of 2936 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe svhost.exe PID 2264 wrote to memory of 1724 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 1724 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 1724 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe cmd.exe PID 2264 wrote to memory of 1724 2264 2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe cmd.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2936 wrote to memory of 2384 2936 svhost.exe iexplore.exe PID 2568 wrote to memory of 2496 2568 tmp.exe iexplore.exe PID 1724 wrote to memory of 2504 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 2504 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 2504 1724 cmd.exe timeout.exe PID 1724 wrote to memory of 2504 1724 cmd.exe timeout.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
svhost.exetmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2578debd234465c8aa7bcdf53bc3858a_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵PID:2564
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2568 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Roaming\tmp.exe3⤵PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2936 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\svhost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- Delays execution with timeout.exe
PID:2504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD532827e69b293b99013bbbe37d029245d
SHA1bc9f80a38f09354d71467a05b0c5a82c3f7dac53
SHA2569250b89157770e3ab59a2c7e2dd6b12b3c61d9b7c6620c3b4727e4bfff10f01f
SHA51258c9a072e2bea0a8f22b4e69512abafad271ca91f2e3d2b4233796dd3d83021aad1c6da69fc8f7e7ca7919d34bde941cb8b5d185b668168866d1180558b93cf5
-
Filesize
325KB
MD52578debd234465c8aa7bcdf53bc3858a
SHA1aaec53a7560318b698cec4f1388f26b1c12f9c40
SHA2560f4e7faf833c30ed300efa46b4b1d083523d48ec2864f110d2a2d5b47eb67a72
SHA512849947365c47ab82f54d7e7b6a5105e28bf684cff0ad3f313541722dcc2b0ae9bbdeb794b771a32a07fd6b1f071f2b99e7c8464167aff036a622fc969ce4fcdf
-
Filesize
189B
MD5dca86f6bec779bba1b58d992319e88db
SHA1844e656d3603d15ae56f36298f8031ad52935829
SHA256413b4ee68f5400fcd30ae5df957d723989b400637dbc7f5d158fa050bdc20743
SHA5124b9d532a777921543b3243020ea4b655a8b956c400b237ce714b5bd8e9a3ad7fdbcb11410e84e2e0ecc45e87dcd107385a487f5bb5b359aabd1322314ef2d24c
-
Filesize
448KB
MD5dea4be0cd6e1e8e3c7b5ac7c0bd90a57
SHA107f8fbaaa4c65c3e9327aeb8afba76895e269507
SHA256a221e9aa2edf42cbd95a7d1aefa30e0d73d2c7ba0cff93c3b53db9e364334fef
SHA512a963cc3056d9fdce74ffabcfa7cc32d62c49700a25167f80468919da4d80806c4ceec82d77be04b8bc9362c43bb25d2a0437708bb1159b7efed48fa0ff749f5f
-
Filesize
172KB
MD5d5ac3689652f1d3566ec15d8ba4f088a
SHA1aedd8e90ec29f1a0259eb31fab519a398cb4f205
SHA2564c4b3ad8895c8ea779e3e359b8f3610f061d4d865170e32b7af648ff0268e2b8
SHA5126b989ca5018c9ff845461e150ac23b92ae71ef1d268d8975e52a3293f15eefadde6f3b73670c902f4d146e80db0f799b08fedd87c786ab7af366f4b54e35ba70