Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
5c6ffc40f7317121749686b8f80063e0
-
SHA1
624e75617f155b1cebcc886555b613bead0b64a3
-
SHA256
8c2d113dd13a397383db160c188c3f1119b7c1e5af6bcd79f28987aa82cbed8b
-
SHA512
5b84d44f2ceb34d9cac6601fc3ac678b1399750f34b75679138d06479c8ad0c9c7ef11fd368a505aeb95bcda96754c2ba9b7af6374711eb79945af9ab593c833
-
SSDEEP
24576:hb1JC//wbZ1J/4iYsAGDAlR8guX7w5xxa/wzJPQnIEyBMNgVLUtfKxKvbaPDFZkp:5Wox4SEMf7RYDEWLvAb8FUi4fM6+Nc
Malware Config
Signatures
-
BitRAT payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/2552-29-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-28-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-30-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-32-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-31-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-33-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-35-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-34-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-36-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-37-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-39-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-40-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-42-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-41-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-43-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat behavioral1/memory/2552-44-0x0000000000400000-0x00000000007CF000-memory.dmp family_bitrat -
Executes dropped EXE 2 IoCs
Processes:
Itizhf.exeItizhf.exepid process 2648 Itizhf.exe 2552 Itizhf.exe -
Loads dropped DLL 1 IoCs
Processes:
5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exepid process 2940 5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2552-27-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-29-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-28-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-24-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-20-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-19-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-30-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-32-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-31-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-33-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-35-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-34-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-36-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-37-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-39-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-40-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-42-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-41-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-43-0x0000000000400000-0x00000000007CF000-memory.dmp upx behavioral1/memory/2552-44-0x0000000000400000-0x00000000007CF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Itizhf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Cihiy = "C:\\Users\\Admin\\AppData\\Roaming\\ichiwi\\Cihiy.url" Itizhf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
Itizhf.exepid process 2552 Itizhf.exe 2552 Itizhf.exe 2552 Itizhf.exe 2552 Itizhf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Itizhf.exedescription pid process target process PID 2648 set thread context of 2552 2648 Itizhf.exe Itizhf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Itizhf.exepid process 2648 Itizhf.exe 2648 Itizhf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Itizhf.exeItizhf.exedescription pid process Token: SeDebugPrivilege 2648 Itizhf.exe Token: SeDebugPrivilege 2552 Itizhf.exe Token: SeShutdownPrivilege 2552 Itizhf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Itizhf.exepid process 2552 Itizhf.exe 2552 Itizhf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exeItizhf.exedescription pid process target process PID 2940 wrote to memory of 2648 2940 5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe Itizhf.exe PID 2940 wrote to memory of 2648 2940 5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe Itizhf.exe PID 2940 wrote to memory of 2648 2940 5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe Itizhf.exe PID 2940 wrote to memory of 2648 2940 5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe Itizhf.exe PID 2648 wrote to memory of 2552 2648 Itizhf.exe Itizhf.exe PID 2648 wrote to memory of 2552 2648 Itizhf.exe Itizhf.exe PID 2648 wrote to memory of 2552 2648 Itizhf.exe Itizhf.exe PID 2648 wrote to memory of 2552 2648 Itizhf.exe Itizhf.exe PID 2648 wrote to memory of 2552 2648 Itizhf.exe Itizhf.exe PID 2648 wrote to memory of 2552 2648 Itizhf.exe Itizhf.exe PID 2648 wrote to memory of 2552 2648 Itizhf.exe Itizhf.exe PID 2648 wrote to memory of 2552 2648 Itizhf.exe Itizhf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c6ffc40f7317121749686b8f80063e0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\ichiwi\Itizhf.exe"C:\Users\Admin\AppData\Roaming\ichiwi\Itizhf.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\ichiwi\Itizhf.exe"C:\Users\Admin\AppData\Roaming\ichiwi\Itizhf.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD55c6ffc40f7317121749686b8f80063e0
SHA1624e75617f155b1cebcc886555b613bead0b64a3
SHA2568c2d113dd13a397383db160c188c3f1119b7c1e5af6bcd79f28987aa82cbed8b
SHA5125b84d44f2ceb34d9cac6601fc3ac678b1399750f34b75679138d06479c8ad0c9c7ef11fd368a505aeb95bcda96754c2ba9b7af6374711eb79945af9ab593c833