Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
f8c656d9ff2a5c0b21769b4e1033bde7
-
SHA1
c2e991aeb28ebf42c1f2dbfcbd4df6e2320ab3d2
-
SHA256
d6e501f0804b1fd3b62a32366a9845a7fd010a0434dac804ffcec95fa67267a3
-
SHA512
098b1ce3e5d95d318caccd1ce77be80484f7cef1aae807e3815f32fa2d49f74be7085c2f716187c7d074ea9e239ebfa1e5817b436c9c92e546bfc0e7560096ed
-
SSDEEP
6144:gCDZnh3bt0kqEZKjwF+IRTA/AntEymXZoelvYihONWKkIAL5wMYDkdIihf/FS/6P:gC1n395ElLNHwWKJAL5D3hna6
Malware Config
Extracted
limerat
-
aes_key
1205
-
antivm
false
-
c2_url
https://pastebin.com/raw/iRjhpqQL
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/iRjhpqQL
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dfgdfge.exe.lnk f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 svhost.exe -
Loads dropped DLL 1 IoCs
pid Process 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3048 set thread context of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\defsghg\dfgdfge.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2664 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\defsghg\dfgdfge.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe Token: 33 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe Token: SeDebugPrivilege 2772 svhost.exe Token: SeDebugPrivilege 2772 svhost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2592 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2592 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2592 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2592 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2816 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 32 PID 3048 wrote to memory of 2816 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 32 PID 3048 wrote to memory of 2816 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 32 PID 3048 wrote to memory of 2816 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 32 PID 3048 wrote to memory of 780 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 34 PID 3048 wrote to memory of 780 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 34 PID 3048 wrote to memory of 780 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 34 PID 3048 wrote to memory of 780 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 34 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2772 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 36 PID 3048 wrote to memory of 2744 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 37 PID 3048 wrote to memory of 2744 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 37 PID 3048 wrote to memory of 2744 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 37 PID 3048 wrote to memory of 2744 3048 f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe 37 PID 2744 wrote to memory of 2664 2744 cmd.exe 39 PID 2744 wrote to memory of 2664 2744 cmd.exe 39 PID 2744 wrote to memory of 2664 2744 cmd.exe 39 PID 2744 wrote to memory of 2664 2744 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/f8c656d9ff2a5c0b21769b4e1033bde7_JaffaCakes118.exe" "%appdata%\defsghg\dfgdfge.exe" /Y2⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %appdata%\defsghg\dfgdfge.exe:Zone.Identifier2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2816
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ren "%appdata%\defsghg\dfgdfge.exe.jpg" dfgdfge.exe2⤵
- System Location Discovery: System Language Discovery
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\defsghg\dfgdfge.exe.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5f8c656d9ff2a5c0b21769b4e1033bde7
SHA1c2e991aeb28ebf42c1f2dbfcbd4df6e2320ab3d2
SHA256d6e501f0804b1fd3b62a32366a9845a7fd010a0434dac804ffcec95fa67267a3
SHA512098b1ce3e5d95d318caccd1ce77be80484f7cef1aae807e3815f32fa2d49f74be7085c2f716187c7d074ea9e239ebfa1e5817b436c9c92e546bfc0e7560096ed
-
Filesize
204B
MD5e2bddbe36b71e23b16f1721da8f3564c
SHA1b01f1c913bb94b8ba068732065d5da347bf143bc
SHA2568b0219b83d6a50727a4acf2ccf53a04cfd348577d90c2489cf9b0d082d43872d
SHA512c07d35abdc8fd3e366383ad7c92d4dc6adebbd0c2ecf0dd7cd5981f3cf72e6d9e6a9cf00719eb7e016dd0dd677ca5794295a2da1a74a8436b092f737db78868b
-
Filesize
255KB
MD59af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3