Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe
-
Size
562KB
-
MD5
430e7cce721d74347a9a7ac87a9a9ec1
-
SHA1
b03b248c279d9e05988c0cd87aa405e9ae55f0e2
-
SHA256
9dbb9ba5a01a654a21d899aef6594ee5fc0b4d0ac68a3c97ec52ef6a8959f27d
-
SHA512
69ad4bd2e3ac61d596ae4ab65abe41128bf8a74cd7366f5f6584d1bccdb4e6ef6ae95dc846917a1fb5fc2fcb680ebcd677b85444e5b7f0c663381885edf5fc0b
-
SSDEEP
12288:X63MOeq3A7EEqsGh3S8CbZJscjIcKvKJNY8lYfIeXQhzMhi1:X21e6yqsGNdCbZeZo8AhzM41
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
mr7bashbab.ddns.net:6606
mr7bashbab.ddns.net:7707
mr7bashbab.ddns.net:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
OBS.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3112-3-0x0000000005500000-0x0000000005528000-memory.dmp family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 916 OBS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2172 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe Token: SeDebugPrivilege 916 OBS.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3112 wrote to memory of 2572 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 89 PID 3112 wrote to memory of 2572 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 89 PID 3112 wrote to memory of 2572 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 89 PID 3112 wrote to memory of 3068 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 91 PID 3112 wrote to memory of 3068 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 91 PID 3112 wrote to memory of 3068 3112 430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe 91 PID 2572 wrote to memory of 380 2572 cmd.exe 93 PID 2572 wrote to memory of 380 2572 cmd.exe 93 PID 2572 wrote to memory of 380 2572 cmd.exe 93 PID 3068 wrote to memory of 2172 3068 cmd.exe 94 PID 3068 wrote to memory of 2172 3068 cmd.exe 94 PID 3068 wrote to memory of 2172 3068 cmd.exe 94 PID 3068 wrote to memory of 916 3068 cmd.exe 95 PID 3068 wrote to memory of 916 3068 cmd.exe 95 PID 3068 wrote to memory of 916 3068 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\430e7cce721d74347a9a7ac87a9a9ec1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "OBS" /tr '"C:\Users\Admin\AppData\Roaming\OBS.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "OBS" /tr '"C:\Users\Admin\AppData\Roaming\OBS.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAE22.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2172
-
-
C:\Users\Admin\AppData\Roaming\OBS.exe"C:\Users\Admin\AppData\Roaming\OBS.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD575bf7e71304f9298dcccb2d563209440
SHA18f6d17b8d29caf57971fea0c639722e4877a44db
SHA256509ad80e60dd219a58b69b40ff8eee841dcd699d0a5415614cb47cabb3019884
SHA5121724a7b15270d76859bc9aca7e51d919ef557638183d3eb904803200de5dcf473d2af74a3745d796f6fe43a719e4b0e9026e795222348d910569841b060d6741
-
Filesize
562KB
MD5430e7cce721d74347a9a7ac87a9a9ec1
SHA1b03b248c279d9e05988c0cd87aa405e9ae55f0e2
SHA2569dbb9ba5a01a654a21d899aef6594ee5fc0b4d0ac68a3c97ec52ef6a8959f27d
SHA51269ad4bd2e3ac61d596ae4ab65abe41128bf8a74cd7366f5f6584d1bccdb4e6ef6ae95dc846917a1fb5fc2fcb680ebcd677b85444e5b7f0c663381885edf5fc0b