Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
298d23c0ecd0b23b303eed58288e8209
-
SHA1
7536e0937095311b8565adbadea597e99745d774
-
SHA256
2ce70e3ec75c2e85928d0590e3d0909bd0fdb28600a5b3443a527d6560de01e6
-
SHA512
bb6766ac874e69d8a37575ffa5e450724b638e82c1e9316bb58f2252d1d047e450686c27c4549e17e19ed5d66207997bff1b0ed2b06a58f9c343785acaf85bb8
-
SSDEEP
3072:gG5yzbGfgyr9z+zyC5yQDVeImFoOS042ywxsaH2+MgsVIVzn0f+CD:AbCRz++OMIgmSzBsyVgf9
Malware Config
Extracted
xpertrat
3.0.10
Group
46.183.220.104:10101
K8P3I007-I4G2-R2U0-V0G8-T1Q3K5W771L5
Signatures
-
Processes:
tmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe -
Processes:
tmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" tmp.exe -
XpertRAT Core payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2376-30-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
Drops startup file 1 IoCs
Processes:
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.exe.lnk 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp.exepid process 892 tmp.exe -
Processes:
tmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" tmp.exe -
Processes:
tmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exetmp.exedescription pid process target process PID 1408 set thread context of 4928 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe PID 892 set thread context of 2376 892 tmp.exe iexplore.exe -
Drops file in Windows directory 3 IoCs
Processes:
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\assembly 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3264 timeout.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exetmp.exepid process 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 892 tmp.exe 892 tmp.exe 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 892 tmp.exe 892 tmp.exe 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exeiexplore.exedescription pid process Token: SeDebugPrivilege 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe Token: 33 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe Token: SeDebugPrivilege 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
tmp.exeiexplore.exepid process 892 tmp.exe 2376 iexplore.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.execmd.exetmp.execmd.exedescription pid process target process PID 1408 wrote to memory of 2072 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe cmd.exe PID 1408 wrote to memory of 2072 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe cmd.exe PID 1408 wrote to memory of 2072 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe cmd.exe PID 2072 wrote to memory of 1564 2072 cmd.exe reg.exe PID 2072 wrote to memory of 1564 2072 cmd.exe reg.exe PID 2072 wrote to memory of 1564 2072 cmd.exe reg.exe PID 1408 wrote to memory of 892 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe tmp.exe PID 1408 wrote to memory of 892 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe tmp.exe PID 1408 wrote to memory of 892 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe tmp.exe PID 1408 wrote to memory of 4928 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe PID 1408 wrote to memory of 4928 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe PID 1408 wrote to memory of 4928 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe PID 1408 wrote to memory of 4928 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe PID 1408 wrote to memory of 4928 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe PID 1408 wrote to memory of 4928 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe PID 1408 wrote to memory of 4928 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe PID 892 wrote to memory of 2376 892 tmp.exe iexplore.exe PID 892 wrote to memory of 2376 892 tmp.exe iexplore.exe PID 892 wrote to memory of 2376 892 tmp.exe iexplore.exe PID 892 wrote to memory of 2376 892 tmp.exe iexplore.exe PID 892 wrote to memory of 2376 892 tmp.exe iexplore.exe PID 892 wrote to memory of 2376 892 tmp.exe iexplore.exe PID 892 wrote to memory of 2376 892 tmp.exe iexplore.exe PID 892 wrote to memory of 2376 892 tmp.exe iexplore.exe PID 1408 wrote to memory of 924 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe cmd.exe PID 1408 wrote to memory of 924 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe cmd.exe PID 1408 wrote to memory of 924 1408 298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe cmd.exe PID 924 wrote to memory of 3264 924 cmd.exe timeout.exe PID 924 wrote to memory of 3264 924 cmd.exe timeout.exe PID 924 wrote to memory of 3264 924 cmd.exe timeout.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
tmp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵PID:1564
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:892 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Roaming\tmp.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\298d23c0ecd0b23b303eed58288e8209_JaffaCakes118.exe"2⤵PID:4928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat2⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26403⤵
- Delays execution with timeout.exe
PID:3264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5298d23c0ecd0b23b303eed58288e8209
SHA17536e0937095311b8565adbadea597e99745d774
SHA2562ce70e3ec75c2e85928d0590e3d0909bd0fdb28600a5b3443a527d6560de01e6
SHA512bb6766ac874e69d8a37575ffa5e450724b638e82c1e9316bb58f2252d1d047e450686c27c4549e17e19ed5d66207997bff1b0ed2b06a58f9c343785acaf85bb8
-
Filesize
190B
MD52f98167fa44c455560450f60ceff0fa0
SHA134b599d23f9424deed3e4ead29d315f2b5e9dd21
SHA256acc75b60b025aa61061c7663a81505dca62d69aa792cac010a11fea2c5d10f3b
SHA5121d1f1eb11f2bb5ea6aecd8260aee3645f6a28b1f71bca354addd88212fa5627609a9f5ee9622b539f6eb1bfea448ede98a049647cac27e088c9938a292617437
-
Filesize
172KB
MD5d5ac3689652f1d3566ec15d8ba4f088a
SHA1aedd8e90ec29f1a0259eb31fab519a398cb4f205
SHA2564c4b3ad8895c8ea779e3e359b8f3610f061d4d865170e32b7af648ff0268e2b8
SHA5126b989ca5018c9ff845461e150ac23b92ae71ef1d268d8975e52a3293f15eefadde6f3b73670c902f4d146e80db0f799b08fedd87c786ab7af366f4b54e35ba70