Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe
-
Size
438KB
-
MD5
6ab6671c9fbba06f36bf4f655d03f498
-
SHA1
02cb1d74714793c5ec3702ca3afbeb45ee7c0588
-
SHA256
4d5b4eea780ab2393d06f02fc1a6b5f3c490ddd8d768271b7534b75072aaf023
-
SHA512
275251629f1022d9cb330d4e91b614b871892e1a0cebaa533275dca0f3e6558316c039469bb5ce12f2807638bff23e7ef8c93933bd2a463d0f361922ed8f356d
-
SSDEEP
3072:ySgW8stAeW4guBOvffu6Em5sK4gMs4oFT89lwYX7aVKiEgQ0evwqdV1cxCc8:ZgW8CGu6/yKLLFTKEVKiEg78jcxJ8
Malware Config
Extracted
asyncrat
0.5.7B
18
185.157.160.136:1973
df4Rtg34dFjwr
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\audac = "C:\\Users\\Admin\\AppData\\Roaming\\auda\\audab.exe" 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2176 2808 6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6ab6671c9fbba06f36bf4f655d03f498_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2176
-