General
-
Target
2c701b9904603479c8e01a692383e396_JaffaCakes118
-
Size
7.0MB
-
Sample
241009-g7flwssckb
-
MD5
2c701b9904603479c8e01a692383e396
-
SHA1
c9662c1ee3ed00ea0f70d12a6e5ecfa50d1d9c77
-
SHA256
0a05f8788ca28d5f4e2ad838a36f83107326d3021fc5bc9824fe2c47dfd07712
-
SHA512
60e2e350e44c5676f283842d2af354b55b559c46eb3e1c8236c2abf87654845f7a6727da1aea824395b0d102a643790fb9eed55f729085dfee595aab259cf650
-
SSDEEP
196608:WHPdZwCsXDjDyf4L2WliXYrHW1LzbpbWg:eP4CEDHL2ciIrHWRzbB
Behavioral task
behavioral1
Sample
2c701b9904603479c8e01a692383e396_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c701b9904603479c8e01a692383e396_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.7B
ASE_2
AsyncMutex_6SI8OkPnk
-
c2_url_file
https://aa.larinax999.repl.co
-
delay
3
-
install
true
-
install_file
MsMpEng.exe
-
install_folder
%AppData%
Extracted
njrat
v4.0
ASE_2
103.91.207.190:4985
Windows
-
reg_key
Windows
-
splitter
|-F-|
Targets
-
-
Target
2c701b9904603479c8e01a692383e396_JaffaCakes118
-
Size
7.0MB
-
MD5
2c701b9904603479c8e01a692383e396
-
SHA1
c9662c1ee3ed00ea0f70d12a6e5ecfa50d1d9c77
-
SHA256
0a05f8788ca28d5f4e2ad838a36f83107326d3021fc5bc9824fe2c47dfd07712
-
SHA512
60e2e350e44c5676f283842d2af354b55b559c46eb3e1c8236c2abf87654845f7a6727da1aea824395b0d102a643790fb9eed55f729085dfee595aab259cf650
-
SSDEEP
196608:WHPdZwCsXDjDyf4L2WliXYrHW1LzbpbWg:eP4CEDHL2ciIrHWRzbB
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1