Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
94b87733c688eacc477a274c06047594_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
94b87733c688eacc477a274c06047594_JaffaCakes118.exe
-
Size
949KB
-
MD5
94b87733c688eacc477a274c06047594
-
SHA1
73d02d5c6714a6c3c7afe628640eca6d035d268d
-
SHA256
28b714bdd63520294c6e4103bf377a89b2afadad3cdf4ef0c58ccb74b78d02c7
-
SHA512
32e55a6fdfac93016001b142120c1affb0f9c4abcdb27c8541780a5cff9298f067adfce011e1cf5ac7e89254b86f6d51a3b8a744e3fdbe73df3b750a5414cc17
-
SSDEEP
12288:AQ58Gd2jEp9VsyS1izvlm2ABNTIuae8d41E:AO1p9VsySWvlPA241
Malware Config
Extracted
asyncrat
0.5.6A
peacelist.ignorelist.com:7707
peacelist.ignorelist.com:8808
peacelist.ignorelist.com:5505
FTPgbnffd
-
delay
10
-
install
true
-
install_file
shost.exe
-
install_folder
%AppData%
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
94b87733c688eacc477a274c06047594_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 94b87733c688eacc477a274c06047594_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
shost.exeshost.exepid process 3644 shost.exe 612 shost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
94b87733c688eacc477a274c06047594_JaffaCakes118.exeshost.exedescription pid process target process PID 1776 set thread context of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 3644 set thread context of 612 3644 shost.exe shost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4732 timeout.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
94b87733c688eacc477a274c06047594_JaffaCakes118.exe94b87733c688eacc477a274c06047594_JaffaCakes118.exeshost.exeshost.exepid process 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 3644 shost.exe 3644 shost.exe 3644 shost.exe 612 shost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
94b87733c688eacc477a274c06047594_JaffaCakes118.exe94b87733c688eacc477a274c06047594_JaffaCakes118.exeshost.exeshost.exedescription pid process Token: SeDebugPrivilege 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe Token: SeDebugPrivilege 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe Token: SeDebugPrivilege 3644 shost.exe Token: SeDebugPrivilege 612 shost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
94b87733c688eacc477a274c06047594_JaffaCakes118.exe94b87733c688eacc477a274c06047594_JaffaCakes118.execmd.exeshost.exedescription pid process target process PID 1776 wrote to memory of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 1776 wrote to memory of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 1776 wrote to memory of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 1776 wrote to memory of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 1776 wrote to memory of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 1776 wrote to memory of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 1776 wrote to memory of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 1776 wrote to memory of 2632 1776 94b87733c688eacc477a274c06047594_JaffaCakes118.exe 94b87733c688eacc477a274c06047594_JaffaCakes118.exe PID 2632 wrote to memory of 5000 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe schtasks.exe PID 2632 wrote to memory of 5000 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe schtasks.exe PID 2632 wrote to memory of 5000 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe schtasks.exe PID 2632 wrote to memory of 3156 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe cmd.exe PID 2632 wrote to memory of 3156 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe cmd.exe PID 2632 wrote to memory of 3156 2632 94b87733c688eacc477a274c06047594_JaffaCakes118.exe cmd.exe PID 3156 wrote to memory of 4732 3156 cmd.exe timeout.exe PID 3156 wrote to memory of 4732 3156 cmd.exe timeout.exe PID 3156 wrote to memory of 4732 3156 cmd.exe timeout.exe PID 3156 wrote to memory of 3644 3156 cmd.exe shost.exe PID 3156 wrote to memory of 3644 3156 cmd.exe shost.exe PID 3156 wrote to memory of 3644 3156 cmd.exe shost.exe PID 3644 wrote to memory of 612 3644 shost.exe shost.exe PID 3644 wrote to memory of 612 3644 shost.exe shost.exe PID 3644 wrote to memory of 612 3644 shost.exe shost.exe PID 3644 wrote to memory of 612 3644 shost.exe shost.exe PID 3644 wrote to memory of 612 3644 shost.exe shost.exe PID 3644 wrote to memory of 612 3644 shost.exe shost.exe PID 3644 wrote to memory of 612 3644 shost.exe shost.exe PID 3644 wrote to memory of 612 3644 shost.exe shost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94b87733c688eacc477a274c06047594_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94b87733c688eacc477a274c06047594_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\94b87733c688eacc477a274c06047594_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\94b87733c688eacc477a274c06047594_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'shost"' /tr "'C:\Users\Admin\AppData\Roaming\shost.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6339.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\shost.exe"C:\Users\Admin\AppData\Roaming\shost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\shost.exe"C:\Users\Admin\AppData\Roaming\shost.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\94b87733c688eacc477a274c06047594_JaffaCakes118.exe.logFilesize
1KB
MD53ec9d3dd240b7a28cb873a02eeb38788
SHA1c96f2b12927335af747597b4087f1c7964835ee2
SHA256ed303f4f8c43e2d68bb7ba386e63b5a4376e96dd9d775eb9d47985e3233b90f2
SHA5125402bc1ea626137976e67215a81d2e8277c031057b9f51c4b92e6f57bfbbafb2b271d63f5398c5bb280c79b8d52e0ec5404bd6c32e9f36c99aa3f49ba21ec494
-
C:\Users\Admin\AppData\Local\Temp\tmp6339.tmp.batFilesize
149B
MD510c9b57e76cb9f5729be8610602f2222
SHA18c7b0976ec40acf135df5995b320e15acd955484
SHA25616e2daf98bbbd9efb6a1df3fb355efbcf21e00b2d30152a599e302a410a61721
SHA512c9ad73c13ed8dab243fef3b638071fcf0739657f1ed11027fec87f1d722516e34bb9d4e10e89b7591bd94f3aa0ab6e6e752b608ffd14f7ef43f8872c780bcaba
-
C:\Users\Admin\AppData\Roaming\shost.exeFilesize
44.9MB
MD5e01db2f7aa7ddc6a3b24cd8c5500394f
SHA1b329fa5a534c0c3850b54bb7cf7d6674621bd6de
SHA256dae309fa8988229e41c532bb68299b0438ffa704b1f0d6b921bc39e2145370c0
SHA5124daee424e9e33804443f56337dd234134c2c8f8e50eaa879a576c6a6db26be2e3e4a09295a4b4cb68821ec69b863dd2565a42e095a0dc0972864123fef9d05ec
-
memory/1776-12-0x0000000005D40000-0x0000000005D84000-memory.dmpFilesize
272KB
-
memory/1776-14-0x0000000075390000-0x0000000075B40000-memory.dmpFilesize
7.7MB
-
memory/1776-5-0x0000000004B70000-0x0000000004B92000-memory.dmpFilesize
136KB
-
memory/1776-6-0x0000000004F10000-0x00000000050D2000-memory.dmpFilesize
1.8MB
-
memory/1776-7-0x0000000004D40000-0x0000000004D64000-memory.dmpFilesize
144KB
-
memory/1776-8-0x0000000004DA0000-0x0000000004DC2000-memory.dmpFilesize
136KB
-
memory/1776-9-0x0000000075390000-0x0000000075B40000-memory.dmpFilesize
7.7MB
-
memory/1776-10-0x0000000005E10000-0x00000000063B4000-memory.dmpFilesize
5.6MB
-
memory/1776-11-0x0000000075390000-0x0000000075B40000-memory.dmpFilesize
7.7MB
-
memory/1776-0-0x000000007539E000-0x000000007539F000-memory.dmpFilesize
4KB
-
memory/1776-13-0x000000007539E000-0x000000007539F000-memory.dmpFilesize
4KB
-
memory/1776-4-0x0000000004CD0000-0x0000000004D36000-memory.dmpFilesize
408KB
-
memory/1776-1-0x0000000000150000-0x0000000000244000-memory.dmpFilesize
976KB
-
memory/1776-3-0x0000000004BE0000-0x0000000004C72000-memory.dmpFilesize
584KB
-
memory/1776-18-0x0000000075390000-0x0000000075B40000-memory.dmpFilesize
7.7MB
-
memory/1776-2-0x0000000002550000-0x0000000002574000-memory.dmpFilesize
144KB
-
memory/2632-20-0x0000000075390000-0x0000000075B40000-memory.dmpFilesize
7.7MB
-
memory/2632-21-0x00000000051F0000-0x000000000528C000-memory.dmpFilesize
624KB
-
memory/2632-25-0x0000000075390000-0x0000000075B40000-memory.dmpFilesize
7.7MB
-
memory/2632-19-0x0000000075390000-0x0000000075B40000-memory.dmpFilesize
7.7MB
-
memory/2632-15-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB