Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
298d23c0ecd0b23b303eed58288e8209
-
SHA1
7536e0937095311b8565adbadea597e99745d774
-
SHA256
2ce70e3ec75c2e85928d0590e3d0909bd0fdb28600a5b3443a527d6560de01e6
-
SHA512
bb6766ac874e69d8a37575ffa5e450724b638e82c1e9316bb58f2252d1d047e450686c27c4549e17e19ed5d66207997bff1b0ed2b06a58f9c343785acaf85bb8
-
SSDEEP
3072:gG5yzbGfgyr9z+zyC5yQDVeImFoOS042ywxsaH2+MgsVIVzn0f+CD:AbCRz++OMIgmSzBsyVgf9
Malware Config
Extracted
xpertrat
3.0.10
Group
46.183.220.104:10101
K8P3I007-I4G2-R2U0-V0G8-T1Q3K5W771L5
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
XpertRAT Core payload 1 IoCs
resource yara_rule behavioral1/memory/692-38-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.exe.lnk 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2232 tmp.exe -
Loads dropped DLL 4 IoCs
pid Process 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 2232 tmp.exe 2232 tmp.exe 2232 tmp.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2732 set thread context of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2232 set thread context of 540 2232 tmp.exe 35 PID 2012 set thread context of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 276 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 2232 tmp.exe 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 2232 tmp.exe 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 2232 tmp.exe 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe Token: 33 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe Token: SeDebugPrivilege 692 iexplore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2232 tmp.exe 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 692 iexplore.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2732 wrote to memory of 772 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 30 PID 2732 wrote to memory of 772 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 30 PID 2732 wrote to memory of 772 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 30 PID 2732 wrote to memory of 772 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 30 PID 772 wrote to memory of 1836 772 cmd.exe 32 PID 772 wrote to memory of 1836 772 cmd.exe 32 PID 772 wrote to memory of 1836 772 cmd.exe 32 PID 772 wrote to memory of 1836 772 cmd.exe 32 PID 2732 wrote to memory of 2232 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2232 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2232 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2232 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2232 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2232 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2232 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 33 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2012 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 34 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2232 wrote to memory of 540 2232 tmp.exe 35 PID 2012 wrote to memory of 692 2012 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 36 PID 2732 wrote to memory of 1136 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 37 PID 2732 wrote to memory of 1136 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 37 PID 2732 wrote to memory of 1136 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 37 PID 2732 wrote to memory of 1136 2732 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 37 PID 1136 wrote to memory of 276 1136 cmd.exe 39 PID 1136 wrote to memory of 276 1136 cmd.exe 39 PID 1136 wrote to memory of 276 1136 cmd.exe 39 PID 1136 wrote to memory of 276 1136 cmd.exe 39 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵PID:1836
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2232 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Roaming\tmp.exe3⤵PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe"2⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2012 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26403⤵
- Delays execution with timeout.exe
PID:276
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5298d23c0ecd0b23b303eed58288e8209
SHA17536e0937095311b8565adbadea597e99745d774
SHA2562ce70e3ec75c2e85928d0590e3d0909bd0fdb28600a5b3443a527d6560de01e6
SHA512bb6766ac874e69d8a37575ffa5e450724b638e82c1e9316bb58f2252d1d047e450686c27c4549e17e19ed5d66207997bff1b0ed2b06a58f9c343785acaf85bb8
-
Filesize
190B
MD52f98167fa44c455560450f60ceff0fa0
SHA134b599d23f9424deed3e4ead29d315f2b5e9dd21
SHA256acc75b60b025aa61061c7663a81505dca62d69aa792cac010a11fea2c5d10f3b
SHA5121d1f1eb11f2bb5ea6aecd8260aee3645f6a28b1f71bca354addd88212fa5627609a9f5ee9622b539f6eb1bfea448ede98a049647cac27e088c9938a292617437
-
Filesize
172KB
MD5d5ac3689652f1d3566ec15d8ba4f088a
SHA1aedd8e90ec29f1a0259eb31fab519a398cb4f205
SHA2564c4b3ad8895c8ea779e3e359b8f3610f061d4d865170e32b7af648ff0268e2b8
SHA5126b989ca5018c9ff845461e150ac23b92ae71ef1d268d8975e52a3293f15eefadde6f3b73670c902f4d146e80db0f799b08fedd87c786ab7af366f4b54e35ba70