Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 09:54

General

  • Target

    05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    05595fa61734a9acede85154fc8fe03b

  • SHA1

    c3842ef0d4b88b53098c9fcb36082219f39b112f

  • SHA256

    9d077371cd1d6dc2b8b337d0bc978afb1e910a947bb0e14c15a37c70c745704c

  • SHA512

    9e959d30eac39b3fe81f36360f29f4ecdc2c5d7b5b71a12c593f0754860e696822530e022552db3c0d9c1df189a18425bb7030bf7a0d869331a2bbda154f6066

  • SSDEEP

    49152:yopU78Oe8T6UQJ+Ss4ie6tu4HY90Jm9WbV:y+E1e87Y+QKZm9WbV

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

eter102.dvrlists.com:3050

Attributes
  • communication_password

    fea0f7015af40ae69a386f06f28a8d31

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Glkcwxl.vbs"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:6864
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\outlook.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:6984
    • C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\05595fa61734a9acede85154fc8fe03b_JaffaCakes118.exe
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:6888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_Glkcwxl.vbs

    Filesize

    137B

    MD5

    41c8a8551ff6fc7a2b9aadcff976ca0f

    SHA1

    444db8be2af0b1128229ac46e4963e0570159c3c

    SHA256

    bc147b5a209f5db13fa86ce6906be0d4dfec76469af3f304d490f10443cf5df5

    SHA512

    b52b716c3827a20d9298a32c8243f8e506c77c4be10e29e39a17ba303d0c65d70e257ab4f1c7368e99608c53ec12e6a1e7287e3d644df1f4cdbc539a501763c8

  • memory/1760-58-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-4-0x0000000074350000-0x0000000074A3E000-memory.dmp

    Filesize

    6.9MB

  • memory/1760-3-0x000000007435E000-0x000000007435F000-memory.dmp

    Filesize

    4KB

  • memory/1760-2-0x0000000074350000-0x0000000074A3E000-memory.dmp

    Filesize

    6.9MB

  • memory/1760-5-0x0000000007F40000-0x00000000080F0000-memory.dmp

    Filesize

    1.7MB

  • memory/1760-6-0x0000000000330000-0x00000000003A8000-memory.dmp

    Filesize

    480KB

  • memory/1760-7-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-8-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-10-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-12-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-14-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-26-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-42-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-60-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-16-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-56-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-70-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-68-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-66-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-64-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-2412-0x0000000074350000-0x0000000074A3E000-memory.dmp

    Filesize

    6.9MB

  • memory/1760-0-0x000000007435E000-0x000000007435F000-memory.dmp

    Filesize

    4KB

  • memory/1760-18-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-54-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-52-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-50-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-48-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-46-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-44-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-40-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-38-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-36-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-34-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-32-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-30-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-28-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-24-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-22-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-20-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/1760-1-0x0000000000C40000-0x0000000000E02000-memory.dmp

    Filesize

    1.8MB

  • memory/1760-62-0x0000000000330000-0x00000000003A2000-memory.dmp

    Filesize

    456KB

  • memory/6888-2411-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB

  • memory/6888-2423-0x0000000000400000-0x00000000007E4000-memory.dmp

    Filesize

    3.9MB