Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 19:17
Static task
static1
Behavioral task
behavioral1
Sample
42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe
-
Size
315KB
-
MD5
42ffde5af3d66024c0699f14922bb1da
-
SHA1
b4019d8834f565877ead605a6930e5fdb1bdcfa1
-
SHA256
9b608fcfcff20713072deb68b58dd218cc10f880b5c85a7903aec99d9471f269
-
SHA512
cef54ced9dd019f24cd8619e3fd989a8ca146680ffb9b98217941068d79c26a38476d696d2a6c91c69fde70e3b8f25f05c18462682b26486f693c16badcd82fe
-
SSDEEP
6144:D6xqzHOWLMGBgPcpdrVVsqy3WmSNRbNqfWvC:OxqzHOM/HVVs/3WNbMfWvC
Malware Config
Extracted
asyncrat
0.5.7B
Default
40.75.8.74:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7A
Default
23.102.129.234:7707
uvkcjjugzqls
-
delay
1
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016cda-8.dat family_asyncrat behavioral1/files/0x0008000000016d07-15.dat family_asyncrat -
Executes dropped EXE 2 IoCs
pid Process 2800 Cuubz.exe 1264 Izkemwkdhqej.exe -
Loads dropped DLL 2 IoCs
pid Process 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2800 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2800 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2800 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 30 PID 2472 wrote to memory of 2800 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 30 PID 2472 wrote to memory of 1264 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 31 PID 2472 wrote to memory of 1264 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 31 PID 2472 wrote to memory of 1264 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 31 PID 2472 wrote to memory of 1264 2472 42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\42ffde5af3d66024c0699f14922bb1da_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Cuubz.exe"C:\Users\Admin\AppData\Local\Temp\Cuubz.exe"2⤵
- Executes dropped EXE
PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\Izkemwkdhqej.exe"C:\Users\Admin\AppData\Local\Temp\Izkemwkdhqej.exe"2⤵
- Executes dropped EXE
PID:1264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD596073281c86416ec2a530a8e21431cac
SHA13760599c3ad5c487fdd0d67feed2d3527769d2a0
SHA256e2966044f7a5771d7cae9b568d50672be4067be8e547382dbec13edc94e1e994
SHA512aab5c5dfc7a1b5115231cde88291a4e8873edc7f79d5278465e15e0ccb5b44adb18dfef06d34bd78f88200b8380fcb3eccc571a2c5db2a8924071745a8524317
-
Filesize
49KB
MD5955fec4f0483cf02565ceba73ca2456d
SHA193aa63dace4f41464b9fa7c2950635f2cd2bc4b4
SHA25687db4d2962807c84b27c1c759abb7744e01685be2e7fdda54e95fc502057491e
SHA5124db6d3ba9492fcdb74c276a3cb46c158a6bbb153532a25210a7d11166403a2aaf1127b6445768106821586f46934ac0a3e60894c554767fdf604cae25b63766d