Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe
-
Size
550KB
-
MD5
a9da9c7246874c63c7ffe6eb591b0df2
-
SHA1
074659f935fec38036899d3fa862292f347c732e
-
SHA256
78b456a1aa4a53349336a991a107727c635bdbaa29ea6206964a28b781b19fd7
-
SHA512
4ae8db88e5bfec1f6a5008e003e72d21d00467161bd60674055a938a5775c9ee909a269a949713fa9cf2fd9476234a651279f57107ac5ac8f91fd2703607df07
-
SSDEEP
12288:2ucUSPMxbcHmoOYQhqs2VUlmA0VdYVxK:SU8MxYHTQhqs2T
Malware Config
Extracted
asyncrat
0.5.7B
Default
195.174.142.168:4784
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4244-14-0x0000000005AB0000-0x0000000005AC2000-memory.dmp family_asyncrat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CID\{44005700-5200-5000-3100-540056005A00} a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CID a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CID\{44005700-5200-5000-3100-540056005A00}\1 = "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" a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CID\{61005900-2F00-4600-4F00-390053003900} a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\CID\{61005900-2F00-4600-4F00-390053003900}\1 = "NsDFMuCKvevrVRw8KMDTJPAkg+42OVrP5JEy537wz4PHtCLFPOZ36+/Af7biLdInE5U3Go9j5DO3gEGbSCXmNrlBkwiXyg3Gk19VUJzKimRqOn/KZ2atK/rBkmL6Cb08q7hwpvgUPkjj0oGtvHmu9Eb6tslPcCJTLefgslCw94hmTG5qqlR8m65bB5Rxqqz6" a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe -
NTFS ADS 6 IoCs
description ioc Process File created C:\Users\Admin\Documents\My Music:{61005900-2F00-4600-4F00-390053003900} a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe File created C:\PerfLogs:{61005900-2F00-4600-4F00-390053003900} a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe File created C:\Users\Admin\AppData\Local\Temp:{44005700-5200-5000-3100-540056005A00} a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe File created C:\Users\Admin\Documents\My Music:{44005700-5200-5000-3100-540056005A00} a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe File created C:\PerfLogs:{44005700-5200-5000-3100-540056005A00} a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe File created C:\Users\Admin\AppData\Local\Temp:{61005900-2F00-4600-4F00-390053003900} a9da9c7246874c63c7ffe6eb591b0df2_JaffaCakes118.exe