Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 12:15

General

  • Target

    efc5d47f6d5aa4dbd22cd109aa13ac30_JaffaCakes118.exe

  • Size

    7.6MB

  • MD5

    efc5d47f6d5aa4dbd22cd109aa13ac30

  • SHA1

    6427617947cca1dc78c5091dcb2c051ab8d5b949

  • SHA256

    deb4b809f9360df97d5991701bb4ce8d6f0a2b929e1459ea509299b3bfa65d62

  • SHA512

    0bf945e9f5f84ed82df9d6c160fb495b0f0e121f86e03ee3cd7acad1e0059d914fffde6ea8e3322015aa184792bbd0f9e9f85697ef9a1d06e172b693f839af29

  • SSDEEP

    196608:wgtgIQ2Y1hyRrWcIaVrtz8cUthPflZsynfr:LJQp1hyRNhVrtzBU7P3nf

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • HiveRAT payload 10 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efc5d47f6d5aa4dbd22cd109aa13ac30_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\efc5d47f6d5aa4dbd22cd109aa13ac30_JaffaCakes118.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Checks computer location settings
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iuvFUtslgAL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5697.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:1760
    • C:\Users\Admin\AppData\Local\Temp\efc5d47f6d5aa4dbd22cd109aa13ac30_JaffaCakes118.exe
      "{path}"
      2⤵
        PID:3056
      • C:\Users\Admin\AppData\Local\Temp\efc5d47f6d5aa4dbd22cd109aa13ac30_JaffaCakes118.exe
        "{path}"
        2⤵
          PID:3044
        • C:\Users\Admin\AppData\Local\Temp\efc5d47f6d5aa4dbd22cd109aa13ac30_JaffaCakes118.exe
          "{path}"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2996
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
            dw20.exe -x -s 856
            3⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of AdjustPrivilegeToken
            PID:396

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\efc5d47f6d5aa4dbd22cd109aa13ac30_JaffaCakes118.exe.log

        Filesize

        405B

        MD5

        139743cbd3ec3457f6e8f7281f719d7f

        SHA1

        0f988d72962f1bd8bb354fea75ec222f860ff9b8

        SHA256

        6f3336b6eb42bd6ebddf810ed9001e7396d8825e4a70005dd6355afc2fd8372a

        SHA512

        cf2469aac4858a21fd51d6e6bae9123adab6ae02d71133922e3ef9b08a4d4e13a8b5a4e24a782862c7be5567e69eb64cd3219bf2d54852bac5fe87d991bb5cc2

      • C:\Users\Admin\AppData\Local\Temp\tmp5697.tmp

        Filesize

        1KB

        MD5

        dc946035c31a54ec4e3753890ddaebc7

        SHA1

        fea235801bdfc501eb4f2e2a67efdc07bcfe2dd0

        SHA256

        0921da236d31e97894d4a2c4ecb3630b5ee66fa21b419a570b9ededb6a34862f

        SHA512

        ed7edd9d5c63cbcadd40bd0878b5a8cae080be6e0a54ad65075dcd8c9df3f8558e1952f8a959f2e6f12629cf7bc42bc1b96ffbd69426148bd3efbf33136a042e

      • memory/964-14-0x0000000074900000-0x0000000074EB1000-memory.dmp

        Filesize

        5.7MB

      • memory/964-0-0x0000000074902000-0x0000000074903000-memory.dmp

        Filesize

        4KB

      • memory/964-4-0x0000000074900000-0x0000000074EB1000-memory.dmp

        Filesize

        5.7MB

      • memory/964-2-0x0000000074900000-0x0000000074EB1000-memory.dmp

        Filesize

        5.7MB

      • memory/964-1-0x0000000074900000-0x0000000074EB1000-memory.dmp

        Filesize

        5.7MB

      • memory/964-3-0x0000000074902000-0x0000000074903000-memory.dmp

        Filesize

        4KB

      • memory/2996-13-0x0000000074900000-0x0000000074EB1000-memory.dmp

        Filesize

        5.7MB

      • memory/2996-42-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-15-0x0000000074900000-0x0000000074EB1000-memory.dmp

        Filesize

        5.7MB

      • memory/2996-11-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-8-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-24-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-32-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-17-0x0000000074900000-0x0000000074EB1000-memory.dmp

        Filesize

        5.7MB

      • memory/2996-40-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-38-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-22-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-20-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-18-0x0000000000400000-0x0000000000A28000-memory.dmp

        Filesize

        6.2MB

      • memory/2996-61-0x0000000074900000-0x0000000074EB1000-memory.dmp

        Filesize

        5.7MB