General
-
Target
656725f09aa6a07f41fef88b362ad8b9_JaffaCakes118
-
Size
9.9MB
-
Sample
240723-anqjeswglg
-
MD5
656725f09aa6a07f41fef88b362ad8b9
-
SHA1
9b4949a9d2d7ddbbefb5bb553bed4a39d2b392c9
-
SHA256
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f
-
SHA512
27eec396079486535a8a870ed2c8d1c4fa97cca0cdf72a5331516c0d7f41d43b84e68844a61f0b9722c1a1da96300e7e29303c3edade635df67807a42003038b
-
SSDEEP
6144:YJl5cP2e8F3cUAojUmFvMKpiC+afJRda3RIkvNIyI/VEpAl/JgIj0oTYibGRrgUW:MiTTeLe0D4
Static task
static1
Behavioral task
behavioral1
Sample
656725f09aa6a07f41fef88b362ad8b9_JaffaCakes118.exe
Resource
win7-20240705-en
Malware Config
Extracted
asyncrat
0.5.7B
Katayumi
normal-knife.auto.playit.gg:54950
normal-knife.auto.playit.gg:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
ZxKKE4oK8.exe
-
install_folder
%Temp%
Targets
-
-
Target
656725f09aa6a07f41fef88b362ad8b9_JaffaCakes118
-
Size
9.9MB
-
MD5
656725f09aa6a07f41fef88b362ad8b9
-
SHA1
9b4949a9d2d7ddbbefb5bb553bed4a39d2b392c9
-
SHA256
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f
-
SHA512
27eec396079486535a8a870ed2c8d1c4fa97cca0cdf72a5331516c0d7f41d43b84e68844a61f0b9722c1a1da96300e7e29303c3edade635df67807a42003038b
-
SSDEEP
6144:YJl5cP2e8F3cUAojUmFvMKpiC+afJRda3RIkvNIyI/VEpAl/JgIj0oTYibGRrgUW:MiTTeLe0D4
-
Turns off Windows Defender SpyNet reporting
-
Looks for VirtualBox Guest Additions in registry
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify Tools
4Modify Registry
4Virtualization/Sandbox Evasion
2