Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 08:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe
-
Size
987KB
-
MD5
2bad27a37d32b4235aac6fcdf74b4306
-
SHA1
8b2b15c01b1e54be6396af46ab3b59fee67f5148
-
SHA256
22cab462a857158b170376f73d28154d7337f9379e84695875be62e178c5597c
-
SHA512
eb6ffa7c229d6e687ed65f69a77d1a94166410d5e77be812c956a58396dbdf7b1b5817e7eee0ae67c62776cd6c1c83be11e44f577a1b780027ee3bfdc7cbc0b0
-
SSDEEP
12288:ruDnl6cMv0obsCnG1eQmXViI2gDnUyfSAgyZx:rklk1NQmX4SUPsX
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
168.62.160.75:1604
168.62.160.75:222
tehliike.duckdns.org:1604
tehliike.duckdns.org:222
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_file
setup.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30 PID 2044 wrote to memory of 1148 2044 2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2bad27a37d32b4235aac6fcdf74b4306_JaffaCakes118.exe"2⤵PID:1148
-