Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 21:08
Behavioral task
behavioral1
Sample
ee6d202c314430288e1babc3c9256f40_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee6d202c314430288e1babc3c9256f40_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee6d202c314430288e1babc3c9256f40_JaffaCakes118.exe
-
Size
361KB
-
MD5
ee6d202c314430288e1babc3c9256f40
-
SHA1
e1db7db841535428e0bd482b6fcd4e35a5ec7c33
-
SHA256
4393b05a23f05af255589f1c32935811d2e6a8f112e54c956b8c52051e0a4669
-
SHA512
ef6ef49b3e5a57a699b2802d2a53ff48db3230e68944bb1b69f8f77180c283055f2efaee59553c7e19371e0bb904084e178f26cea8312ca55e2280057552ecf2
-
SSDEEP
6144:Ul6YqK05YIe1QlzZPGrllLF/NABJj7PF4eSvJHnmrKqslCjru8dkcVLf1DQ7LaaN:IlqKjSzZPGRlpU1F3SvJulXvVdDIpJXD
Malware Config
Extracted
webmonitor
qqsola.wm01.to:443
-
config_key
jJYLbTB9TsvWtCPWrodDFU1k5EBbvtuI
-
private_key
neS5F12vo
-
url_path
/recv5.php
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
WebMonitor payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1192-3-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1192-5-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1192-6-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1192-9-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1192-12-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1192-13-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1192-14-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1192-16-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor behavioral1/memory/1192-17-0x0000000000400000-0x00000000004F2000-memory.dmp family_webmonitor -
Processes:
resource yara_rule behavioral1/memory/1192-0-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-3-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-5-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-6-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-9-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-12-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-13-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-14-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-16-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral1/memory/1192-17-0x0000000000400000-0x00000000004F2000-memory.dmp upx -
Unexpected DNS network traffic destination 11 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 1.2.4.8 Destination IP 185.141.152.26 Destination IP 114.114.114.114 Destination IP 185.141.152.26 Destination IP 1.2.4.8 Destination IP 185.141.152.26 Destination IP 185.141.152.26 Destination IP 1.2.4.8 Destination IP 1.2.4.8 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ee6d202c314430288e1babc3c9256f40_JaffaCakes118.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee6d202c314430288e1babc3c9256f40_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ee6d202c314430288e1babc3c9256f40_JaffaCakes118.exedescription pid process Token: SeShutdownPrivilege 1192 ee6d202c314430288e1babc3c9256f40_JaffaCakes118.exe