Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
6ce823abf08804817553fb0d2b9a00fb
-
SHA1
cc5633d752e27f6179448bb3f8fb855d547e11c0
-
SHA256
418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d
-
SHA512
cdb32028fc5320103fc81874a2ff475c56338bf3c933435dcb4ea852279cf32c5c4f43736964fb365c65714e83967b5073b76d603d3b26f27369947d0cc327e4
-
SSDEEP
24576:cTfEWQMHi9jzdDnAlbV+Qax+Ekedq05uWGcqmGoRiNLVRAeUXsk0+FpIJze:mcW4fpx+RqqHMoLvHgpIJC
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/2540-65-0x0000000004AF0000-0x0000000004B26000-memory.dmp parallax_rat behavioral1/memory/1484-67-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-81-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-88-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-87-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-86-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-85-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-84-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-83-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-82-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-79-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-78-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-77-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-76-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-73-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-80-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-75-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral1/memory/1484-74-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat -
Blocklisted process makes network request 5 IoCs
flow pid Process 17 1484 cmd.exe 17 1484 cmd.exe 17 1484 cmd.exe 17 1484 cmd.exe 17 1484 cmd.exe -
Executes dropped EXE 4 IoCs
pid Process 1684 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 2764 MasterDrive.exe 2628 atikmdag-patcher.exe -
Loads dropped DLL 6 IoCs
pid Process 1252 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 1728 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\lsm.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 2764 MasterDrive.exe 2540 mstsc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2540 mstsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1684 1252 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1684 1252 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1684 1252 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1684 1252 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1684 1252 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1684 1252 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 28 PID 1252 wrote to memory of 1684 1252 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 28 PID 1684 wrote to memory of 1728 1684 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 29 PID 1684 wrote to memory of 1728 1684 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 29 PID 1684 wrote to memory of 1728 1684 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 29 PID 1684 wrote to memory of 1728 1684 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 29 PID 1728 wrote to memory of 2692 1728 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2692 1728 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2692 1728 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2692 1728 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2692 1728 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2692 1728 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 30 PID 1728 wrote to memory of 2692 1728 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 30 PID 2692 wrote to memory of 2764 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 31 PID 2692 wrote to memory of 2764 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 31 PID 2692 wrote to memory of 2764 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 31 PID 2692 wrote to memory of 2764 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 31 PID 2692 wrote to memory of 2628 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 32 PID 2692 wrote to memory of 2628 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 32 PID 2692 wrote to memory of 2628 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 32 PID 2692 wrote to memory of 2628 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 32 PID 2692 wrote to memory of 2628 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 32 PID 2692 wrote to memory of 2628 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 32 PID 2692 wrote to memory of 2628 2692 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 32 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2764 wrote to memory of 2540 2764 MasterDrive.exe 33 PID 2540 wrote to memory of 1484 2540 mstsc.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\is-ILAT6.tmp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-ILAT6.tmp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp" /SL5="$400E4,1181168,740864,C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe" /VERYSILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\is-GS7RB.tmp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-GS7RB.tmp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp" /SL5="$500E4,1181168,740864,C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\MasterDrive.exe"C:\Users\Admin\AppData\Local\Temp\MasterDrive.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\system32\mstsc.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"7⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:1484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher.exe"C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher.exe"5⤵
- Executes dropped EXE
PID:2628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1020KB
MD5c9eaffd90d45b526adac135a898844a5
SHA1bd297848d85bf68299741c15ddf4a44486c549b4
SHA256160da6fae97c7b54a2c1f0d55ce76399f689e98ed7228d4d9205aebb63ad4480
SHA51212f86cd14c7d5652eaa18dd250802ad1f1210ee025857817dfea2cb7d2d146655d261ceccc0dcc60f19053b7e06424e6f563ecd488a72a95d0e7ed22e9b230b0
-
Filesize
93KB
MD5d61992cbdda1a789a9d5f597fd0de125
SHA130ee90f65129e2529c7ad940f2006db1a6cf3918
SHA256ba57d1539f4a7286075d8d383012a50af2e019714f8889ba03e23fbe1a2f73d0
SHA512ced9e4a7a9b915dcb233a35493633b10a97bf716c976638b6f0be4d8c643a4c7fad1f6655cfa4704f807f22920757dec875dd2f26d61ef535d55a64460bd1a74
-
Filesize
2.4MB
MD5cb8ddb3cebc725405485ae32d8e58331
SHA161bc7caa715458b30d7a574b1d102b6966b86b5e
SHA256f1b253174ea05ac8b1b452eed3ef5ae8adb0d1fa2c3527b3620e0a9b5d1ba6e7
SHA51256abdd8bde5ce947126dcf203ddbfd730ee062488e150561fc9f73a9ee0b570f751d2f9f6466eefaa7c2c4b7dfc1d98dcf7606f846a25c162319fdb3dde49655