Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
6ce823abf08804817553fb0d2b9a00fb
-
SHA1
cc5633d752e27f6179448bb3f8fb855d547e11c0
-
SHA256
418848721e51cf8490956e11b8eb75444a460fa07b4201be79d9b609e57d5b7d
-
SHA512
cdb32028fc5320103fc81874a2ff475c56338bf3c933435dcb4ea852279cf32c5c4f43736964fb365c65714e83967b5073b76d603d3b26f27369947d0cc327e4
-
SSDEEP
24576:cTfEWQMHi9jzdDnAlbV+Qax+Ekedq05uWGcqmGoRiNLVRAeUXsk0+FpIJze:mcW4fpx+RqqHMoLvHgpIJC
Malware Config
Signatures
-
ParallaxRat payload 18 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral2/memory/5004-51-0x00000000044B0000-0x00000000044E6000-memory.dmp parallax_rat behavioral2/memory/3456-52-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-72-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-71-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-70-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-69-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-68-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-67-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-66-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-65-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-64-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-63-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-62-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-61-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-60-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-59-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-58-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat behavioral2/memory/3456-57-0x0000000000400000-0x000000000042B000-memory.dmp parallax_rat -
Blocklisted process makes network request 5 IoCs
flow pid Process 52 3456 cmd.exe 52 3456 cmd.exe 52 3456 cmd.exe 52 3456 cmd.exe 52 3456 cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp -
Executes dropped EXE 4 IoCs
pid Process 3436 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 448 MasterDrive.exe 548 atikmdag-patcher.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\lsm.job cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 448 MasterDrive.exe 5004 mstsc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5004 mstsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 3436 4484 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 83 PID 4484 wrote to memory of 3436 4484 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 83 PID 4484 wrote to memory of 3436 4484 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 83 PID 3436 wrote to memory of 4476 3436 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 84 PID 3436 wrote to memory of 4476 3436 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 84 PID 3436 wrote to memory of 4476 3436 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 84 PID 4476 wrote to memory of 4272 4476 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 86 PID 4476 wrote to memory of 4272 4476 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 86 PID 4476 wrote to memory of 4272 4476 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe 86 PID 4272 wrote to memory of 448 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 89 PID 4272 wrote to memory of 448 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 89 PID 4272 wrote to memory of 448 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 89 PID 4272 wrote to memory of 548 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 90 PID 4272 wrote to memory of 548 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 90 PID 4272 wrote to memory of 548 4272 6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp 90 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96 PID 448 wrote to memory of 5004 448 MasterDrive.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\is-SD9B6.tmp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-SD9B6.tmp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp" /SL5="$B0058,1181168,740864,C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\is-UUR9C.tmp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-UUR9C.tmp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.tmp" /SL5="$A0056,1181168,740864,C:\Users\Admin\AppData\Local\Temp\6ce823abf08804817553fb0d2b9a00fb_JaffaCakes118.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\MasterDrive.exe"C:\Users\Admin\AppData\Local\Temp\MasterDrive.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\system32\mstsc.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"7⤵
- Blocklisted process makes network request
- Drops file in Windows directory
PID:3456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher.exe"C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher.exe"5⤵
- Executes dropped EXE
PID:548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1020KB
MD5c9eaffd90d45b526adac135a898844a5
SHA1bd297848d85bf68299741c15ddf4a44486c549b4
SHA256160da6fae97c7b54a2c1f0d55ce76399f689e98ed7228d4d9205aebb63ad4480
SHA51212f86cd14c7d5652eaa18dd250802ad1f1210ee025857817dfea2cb7d2d146655d261ceccc0dcc60f19053b7e06424e6f563ecd488a72a95d0e7ed22e9b230b0
-
Filesize
93KB
MD5d61992cbdda1a789a9d5f597fd0de125
SHA130ee90f65129e2529c7ad940f2006db1a6cf3918
SHA256ba57d1539f4a7286075d8d383012a50af2e019714f8889ba03e23fbe1a2f73d0
SHA512ced9e4a7a9b915dcb233a35493633b10a97bf716c976638b6f0be4d8c643a4c7fad1f6655cfa4704f807f22920757dec875dd2f26d61ef535d55a64460bd1a74
-
Filesize
2.4MB
MD5cb8ddb3cebc725405485ae32d8e58331
SHA161bc7caa715458b30d7a574b1d102b6966b86b5e
SHA256f1b253174ea05ac8b1b452eed3ef5ae8adb0d1fa2c3527b3620e0a9b5d1ba6e7
SHA51256abdd8bde5ce947126dcf203ddbfd730ee062488e150561fc9f73a9ee0b570f751d2f9f6466eefaa7c2c4b7dfc1d98dcf7606f846a25c162319fdb3dde49655