Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe
-
Size
9.0MB
-
MD5
8b1ccce8f40669f2435c69ff9325694a
-
SHA1
4ac0286ca055acb1761ad83d1ee806e95cf0e04e
-
SHA256
99f3be344f93a5d487c49260f2636602c44930ff7c5fea908b3ccd59fbe5b8c1
-
SHA512
3e451d9b7cf612579989ad1f0026cfc15eb7565851189164bb6665a8942f873f064e7882ab1d1a82c5f3701d4c5ebccf9d94fcc215a7ef0022642fbc8fee0f74
-
SSDEEP
196608:CI0tHoI0tHoI0tHoI0tHoI0tHoI0tHoI0tHoI0tH:Cqqqqqqq
Malware Config
Extracted
asyncrat
0.5.6B
rony.ooguy.com:6606
rony.ooguy.com:7707
rony.ooguy.com:8808
eekldwatyqsu
-
delay
95
-
install
true
-
install_file
ccleanerr.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1624-7-0x0000000000F10000-0x0000000000F22000-memory.dmp family_asyncrat behavioral1/memory/1732-23-0x00000000004D0000-0x00000000004E2000-memory.dmp family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1732 ccleanerr.exe -
Loads dropped DLL 1 IoCs
pid Process 2008 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccleanerr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1900 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2456 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe 31 PID 1624 wrote to memory of 2456 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe 31 PID 1624 wrote to memory of 2456 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe 31 PID 1624 wrote to memory of 2456 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe 31 PID 1624 wrote to memory of 2008 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe 33 PID 1624 wrote to memory of 2008 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe 33 PID 1624 wrote to memory of 2008 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe 33 PID 1624 wrote to memory of 2008 1624 8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe 33 PID 2008 wrote to memory of 1900 2008 cmd.exe 35 PID 2008 wrote to memory of 1900 2008 cmd.exe 35 PID 2008 wrote to memory of 1900 2008 cmd.exe 35 PID 2008 wrote to memory of 1900 2008 cmd.exe 35 PID 2008 wrote to memory of 1732 2008 cmd.exe 36 PID 2008 wrote to memory of 1732 2008 cmd.exe 36 PID 2008 wrote to memory of 1732 2008 cmd.exe 36 PID 2008 wrote to memory of 1732 2008 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b1ccce8f40669f2435c69ff9325694a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "'ccleanerr"' /tr "'C:\Users\Admin\AppData\Roaming\ccleanerr.exe"'2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2456
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD3B4.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1900
-
-
C:\Users\Admin\AppData\Roaming\ccleanerr.exe"C:\Users\Admin\AppData\Roaming\ccleanerr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5f25012947224ddeb23556a58732ca498
SHA1c401fbdd24e5af1632c0b7d2bc970c3d952fa86a
SHA256df21ad87c21594771ad9246f869686503eb259a13f0a4275f148301a0e1fb8f6
SHA512b6581b6a319325c86048fcd229bf3c8eea724be559fe8b08cdd3baed54c00e9ba0824d423bdfd0a47f571664b70000a72ab7da8295d416f54f51ff7095f21900
-
Filesize
60KB
MD554f2e9ca52baecf6d0a6140b2abedf96
SHA1296e66d6ab339b02902b9c2e92b024149537f459
SHA256666205cf1334d7099f9b018e4e1592303aac9d8edcc33f128fb3e46931a7e739
SHA512bb948dc41f3b0e3a3450e52e060a934e6d095a7c12fd3e6e0dac39d5b7448929d9fa16c8e6b5c813425ad0be07d6f72a9e914e88678e1a18ee1b33bb16a0b952