Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 21:52
Behavioral task
behavioral1
Sample
4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe
-
Size
5.9MB
-
MD5
4b8fd05f24e7dd6a8c77decf26006818
-
SHA1
756afe0c25d5bed2e17ab459fa86f6d78ed01cc2
-
SHA256
391a0926a39689253c6363a4138d05b6160e73032c97c4b9d6ed63ed8d1530ab
-
SHA512
45c544268e98cdcaa576617e7e6d39132b2836564c43721478b0b79708057b98fa3c67c5c2c95f19eafd12e14c9cba1b4d50442120e27fb7a1f63e2029357c4f
-
SSDEEP
98304:eVjLh6fL15rloC3QUTb3oaurBOxaY6qZNeyRb+VXukHnq6HOTUkAtnvOkNj++:7DX3QUv7uYIY6qpRbQHH9APAJOqj++
Malware Config
Extracted
bitrat
1.32
178.159.39.203:5552
-
communication_password
e48e13207341b6bffb7fb1622282247b
-
install_dir
driversmgr
-
install_file
servicemgrdriver.exe
-
tor_process
tor
Signatures
-
resource yara_rule behavioral2/memory/3996-1-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral2/memory/3996-5-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral2/memory/3996-7-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral2/memory/3996-11-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral2/memory/3996-16-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral2/memory/3996-20-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect behavioral2/memory/3996-25-0x0000000000400000-0x0000000000FD5000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\servicemgrdriver = "C:\\Users\\Admin\\AppData\\Local\\driversmgr\\servicemgrdriver.exeȀ" 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\servicemgrdriver = "C:\\Users\\Admin\\AppData\\Local\\driversmgr\\servicemgrdriver.exe琀" 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\servicemgrdriver = "C:\\Users\\Admin\\AppData\\Local\\driversmgr\\servicemgrdriver.exe" 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 30 IoCs
pid Process 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe 3996 4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b8fd05f24e7dd6a8c77decf26006818_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3996