Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 04:45
Static task
static1
Behavioral task
behavioral1
Sample
a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe
-
Size
37KB
-
MD5
a57059121da1c80b6a2f29007c279aad
-
SHA1
441764fbb00f2817776432ea6b4a35ea5b2c0d85
-
SHA256
50bd4097d131a0cb93d9e6d7fa5ee6e5f32009841c34dd92928e2b0677ebb1be
-
SHA512
2fdbbf71bfb75815b8c1cffe0380b0a1c89bacfa9e752eac4bc8b9650a3cc18916c04855e54e2d8ff5e2be8bfed18fe720eb0cf2ce515ea88428043f9f39bc2c
-
SSDEEP
384:Fs2gHU9E6nPdcKN9AVH84ijuMCQQ/T746gfqRVb+d0E7hOh257xAookwMawAlK43:HwDTAyVboD37FSKYmediLe7
Malware Config
Extracted
bitrat
1.34
2361.zapto.org:2361
-
communication_password
65be3cefcdacaafd59afcd035e8f2652
-
tor_process
tor
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral2/memory/3220-6-0x0000000006450000-0x0000000006648000-memory.dmp beds_protector -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1760 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 1760 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 1760 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 1760 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3220 set thread context of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe Token: SeShutdownPrivilege 1760 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1760 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 1760 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3220 wrote to memory of 1180 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 94 PID 3220 wrote to memory of 1180 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 94 PID 3220 wrote to memory of 1180 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 94 PID 3220 wrote to memory of 1188 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 95 PID 3220 wrote to memory of 1188 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 95 PID 3220 wrote to memory of 1188 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 95 PID 3220 wrote to memory of 1840 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 96 PID 3220 wrote to memory of 1840 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 96 PID 3220 wrote to memory of 1840 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 96 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97 PID 3220 wrote to memory of 1760 3220 a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"2⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"2⤵PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"2⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a57059121da1c80b6a2f29007c279aad_JaffaCakes118.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1760
-