Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 23:19
Static task
static1
Behavioral task
behavioral1
Sample
024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe
-
Size
3.6MB
-
MD5
024a2b33f4a43ab679b44f1b9bcb6bcc
-
SHA1
f154baff6d0e53d0f40ca49db29d911ec3231a8f
-
SHA256
4ad56ad56865d9c280cdff0b03a69b51a36a032847ee7d7bc62b8aecb0b6981c
-
SHA512
5b8d0e9605e929763ccbe286d4c63f3c12b0338cbcd1fcff301482de45c9f3d2e9240fab5f54179685a2c856a24af03c2fec4c6969070698d7da2b099b5c08a4
-
SSDEEP
49152:CxHSYI6JgG2BvvPG8i51PFZgBciXPFKz+cWvjVrKJczGdcN:+SYI6JgGkv3G8i5ZFZJiXPFOSp3zs
Malware Config
Signatures
-
BitRAT payload 37 IoCs
resource yara_rule behavioral1/memory/1960-28-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-27-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-29-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-30-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-32-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-31-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-33-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-34-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-35-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-36-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-37-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-39-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-38-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-40-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-41-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-43-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-42-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-44-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-45-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-47-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-46-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1956-58-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-60-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-59-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1956-61-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-63-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-62-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1956-65-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1956-64-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-67-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-66-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-69-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-68-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-71-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-70-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-73-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat behavioral1/memory/1960-72-0x0000000000400000-0x0000000000811000-memory.dmp family_bitrat -
Executes dropped EXE 1 IoCs
pid Process 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe -
Loads dropped DLL 1 IoCs
pid Process 1844 cmd.exe -
resource yara_rule behavioral1/memory/1960-21-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-22-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-25-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-26-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-28-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-27-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-29-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-30-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-32-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-31-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-33-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-34-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-35-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-36-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-37-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-39-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-38-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-40-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-41-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-43-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-42-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-44-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-45-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-47-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-46-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1956-58-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-60-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-59-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1956-61-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-63-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-62-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1956-65-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1956-64-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-67-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-66-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-69-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-68-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-71-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-70-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-73-0x0000000000400000-0x0000000000811000-memory.dmp upx behavioral1/memory/1960-72-0x0000000000400000-0x0000000000811000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCAZZSD26923540123KJLVYTYREXTQQQ = "C:\\Users\\Admin\\AppData\\Local\\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCAZZSD26923540123KJLVYTYREXTQQQ = "C:\\Users\\Admin\\AppData\\Local\\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1960 mscorsvw.exe 1960 mscorsvw.exe 1956 mscorsvw.exe 1956 mscorsvw.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2684 set thread context of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 set thread context of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe Token: SeDebugPrivilege 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe Token: SeShutdownPrivilege 1960 mscorsvw.exe Token: SeShutdownPrivilege 1956 mscorsvw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 mscorsvw.exe 1960 mscorsvw.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2664 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2664 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2664 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe 31 PID 2056 wrote to memory of 2664 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe 31 PID 2056 wrote to memory of 1844 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe 33 PID 2056 wrote to memory of 1844 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe 33 PID 2056 wrote to memory of 1844 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe 33 PID 2056 wrote to memory of 1844 2056 024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe 33 PID 1844 wrote to memory of 2684 1844 cmd.exe 35 PID 1844 wrote to memory of 2684 1844 cmd.exe 35 PID 1844 wrote to memory of 2684 1844 cmd.exe 35 PID 1844 wrote to memory of 2684 1844 cmd.exe 35 PID 2684 wrote to memory of 2904 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 36 PID 2684 wrote to memory of 2904 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 36 PID 2684 wrote to memory of 2904 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 36 PID 2684 wrote to memory of 2904 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 36 PID 2904 wrote to memory of 2920 2904 cmd.exe 38 PID 2904 wrote to memory of 2920 2904 cmd.exe 38 PID 2904 wrote to memory of 2920 2904 cmd.exe 38 PID 2904 wrote to memory of 2920 2904 cmd.exe 38 PID 2684 wrote to memory of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 wrote to memory of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 wrote to memory of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 wrote to memory of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 wrote to memory of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 wrote to memory of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 wrote to memory of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 wrote to memory of 1960 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 39 PID 2684 wrote to memory of 1812 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 40 PID 2684 wrote to memory of 1812 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 40 PID 2684 wrote to memory of 1812 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 40 PID 2684 wrote to memory of 1812 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 40 PID 1812 wrote to memory of 1132 1812 cmd.exe 42 PID 1812 wrote to memory of 1132 1812 cmd.exe 42 PID 1812 wrote to memory of 1132 1812 cmd.exe 42 PID 1812 wrote to memory of 1132 1812 cmd.exe 42 PID 2684 wrote to memory of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43 PID 2684 wrote to memory of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43 PID 2684 wrote to memory of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43 PID 2684 wrote to memory of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43 PID 2684 wrote to memory of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43 PID 2684 wrote to memory of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43 PID 2684 wrote to memory of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43 PID 2684 wrote to memory of 1956 2684 ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\024a2b33f4a43ab679b44f1b9bcb6bcc_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe"C:\Users\Admin\AppData\Local\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VCAZZSD26923540123KJLVYTYREXTQQQ" /t REG_SZ /d "C:\Users\Admin\AppData\Local\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VCAZZSD26923540123KJLVYTYREXTQQQ" /t REG_SZ /d "C:\Users\Admin\AppData\Local\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VCAZZSD26923540123KJLVYTYREXTQQQ" /t REG_SZ /d "C:\Users\Admin\AppData\Local\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "VCAZZSD26923540123KJLVYTYREXTQQQ" /t REG_SZ /d "C:\Users\Admin\AppData\Local\ASDWRTEssscx342VJHVYGHVJJ7890MSDDERMYULLNMM.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1132
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5024a2b33f4a43ab679b44f1b9bcb6bcc
SHA1f154baff6d0e53d0f40ca49db29d911ec3231a8f
SHA2564ad56ad56865d9c280cdff0b03a69b51a36a032847ee7d7bc62b8aecb0b6981c
SHA5125b8d0e9605e929763ccbe286d4c63f3c12b0338cbcd1fcff301482de45c9f3d2e9240fab5f54179685a2c856a24af03c2fec4c6969070698d7da2b099b5c08a4