Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe
-
Size
564KB
-
MD5
336e6d4b9e8b8ac0d191a99d992e40b0
-
SHA1
d204e15e169d909171fbae5a8445c8f974d316c9
-
SHA256
ceb87ebc670d67f91d08ccc0ea6c6a24f974e99890839d5147f7feb597b51489
-
SHA512
c52e6ce618810df0719fe647b8e70ff275199bb4a0d5628429de40b16d466b6d4538704024f03db8fad91b658c8d351637ca016eba1d8566af736fb3035029dd
-
SSDEEP
12288:sREMc3GfziFWwrOO4pe+F3Q4/Pa6K6g+RgDNEV1850RixGs4Pi7ot:sqMqyFwrODpe+C36K6g+R6EHe0RixP4f
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4228-6-0x0000000007330000-0x0000000007368000-memory.dmp family_zgrat_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2348 AdobeReder10.exe 2140 AdobeReder10.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/4228-6-0x0000000007330000-0x0000000007368000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reder 10 = "C:\\Users\\Admin\\AppData\\Local\\AdobeReder10.exe -boot" AdobeReder10.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2348 set thread context of 2140 2348 AdobeReder10.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2140 AdobeReder10.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4228 336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe Token: SeDebugPrivilege 2348 AdobeReder10.exe Token: SeDebugPrivilege 2140 AdobeReder10.exe Token: 33 2140 AdobeReder10.exe Token: SeIncBasePriorityPrivilege 2140 AdobeReder10.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2140 AdobeReder10.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4228 wrote to memory of 1228 4228 336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe 88 PID 4228 wrote to memory of 1228 4228 336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe 88 PID 4228 wrote to memory of 1228 4228 336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe 88 PID 4228 wrote to memory of 2888 4228 336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe 90 PID 4228 wrote to memory of 2888 4228 336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe 90 PID 4228 wrote to memory of 2888 4228 336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe 90 PID 4504 wrote to memory of 2348 4504 explorer.exe 92 PID 4504 wrote to memory of 2348 4504 explorer.exe 92 PID 4504 wrote to memory of 2348 4504 explorer.exe 92 PID 2348 wrote to memory of 2140 2348 AdobeReder10.exe 96 PID 2348 wrote to memory of 2140 2348 AdobeReder10.exe 96 PID 2348 wrote to memory of 2140 2348 AdobeReder10.exe 96 PID 2348 wrote to memory of 2140 2348 AdobeReder10.exe 96 PID 2348 wrote to memory of 2140 2348 AdobeReder10.exe 96 PID 2348 wrote to memory of 2140 2348 AdobeReder10.exe 96 PID 2348 wrote to memory of 2140 2348 AdobeReder10.exe 96 PID 2348 wrote to memory of 2140 2348 AdobeReder10.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\336e6d4b9e8b8ac0d191a99d992e40b0_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\AdobeReder10.exe"2⤵PID:1228
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" /c, "C:\Users\Admin\AppData\Local\AdobeReder10.exe"2⤵PID:2888
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\AdobeReder10.exe"C:\Users\Admin\AppData\Local\AdobeReder10.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\AdobeReder10.exe"C:\Users\Admin\AppData\Local\AdobeReder10.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD5336e6d4b9e8b8ac0d191a99d992e40b0
SHA1d204e15e169d909171fbae5a8445c8f974d316c9
SHA256ceb87ebc670d67f91d08ccc0ea6c6a24f974e99890839d5147f7feb597b51489
SHA512c52e6ce618810df0719fe647b8e70ff275199bb4a0d5628429de40b16d466b6d4538704024f03db8fad91b658c8d351637ca016eba1d8566af736fb3035029dd
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3