Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 06:26

General

  • Target

    2c701b9904603479c8e01a692383e396_JaffaCakes118.exe

  • Size

    7.0MB

  • MD5

    2c701b9904603479c8e01a692383e396

  • SHA1

    c9662c1ee3ed00ea0f70d12a6e5ecfa50d1d9c77

  • SHA256

    0a05f8788ca28d5f4e2ad838a36f83107326d3021fc5bc9824fe2c47dfd07712

  • SHA512

    60e2e350e44c5676f283842d2af354b55b559c46eb3e1c8236c2abf87654845f7a6727da1aea824395b0d102a643790fb9eed55f729085dfee595aab259cf650

  • SSDEEP

    196608:WHPdZwCsXDjDyf4L2WliXYrHW1LzbpbWg:eP4CEDHL2ciIrHWRzbB

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

ASE_2

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • c2_url_file

    https://aa.larinax999.repl.co

  • delay

    3

  • install

    true

  • install_file

    MsMpEng.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

njrat

Version

v4.0

Botnet

ASE_2

C2

103.91.207.190:4985

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |-F-|

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Async RAT payload 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c701b9904603479c8e01a692383e396_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2c701b9904603479c8e01a692383e396_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\cmd.exe
      "C:\Users\Admin\AppData\Local\Temp\cmd.exe" GoZgc6IpGuOXQ36dVdtx
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\cmd.exe
        "C:\Users\Admin\AppData\Local\Temp\cmd.exe" GoZgc6IpGuOXQ36dVdtx
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2404
    • C:\Users\Admin\AppData\Local\Temp\temp.exe
      "C:\Users\Admin\AppData\Local\Temp\temp.exe" oGzlirr1EQPdBmb6YVZq
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Users\Admin\AppData\Local\Temp\ASE_2.EXE
        "C:\Users\Admin\AppData\Local\Temp\ASE_2.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:476
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "MsMpEng" /tr '"C:\Users\Admin\AppData\Roaming\MsMpEng.exe"' & exit
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1044
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "MsMpEng" /tr '"C:\Users\Admin\AppData\Roaming\MsMpEng.exe"'
            5⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:2320
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp9147.tmp.bat""
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:764
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:1800
          • C:\Users\Admin\AppData\Roaming\MsMpEng.exe
            "C:\Users\Admin\AppData\Roaming\MsMpEng.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:1868
      • C:\Users\Admin\AppData\Local\Temp\MSMPENG_ASE.EXE
        "C:\Users\Admin\AppData\Local\Temp\MSMPENG_ASE.EXE"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:592
        • C:\Users\Admin\AppData\Roaming\MsMpEng_ASE.exe.exe
          "C:\Users\Admin\AppData\Roaming\MsMpEng_ASE.exe.exe"
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:1128
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:1588
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h +r +s "C:\Users\Admin\AppData\Roaming\MsMpEng_ASE.exe.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSMPENG_ASE.EXE

    Filesize

    27KB

    MD5

    8ca3aa218d25ea5a0b172b17415bb003

    SHA1

    f39fb0aea10075935403c5c23f780fe64345e248

    SHA256

    0c7ac7076b94ae6d619a6d3ada388f823b7a13d8927810a36a0dd92b8d4b08cb

    SHA512

    254ef34b38bcc52244c676fff9d6ca7adeeea4259f2d55748ce57dca6ee4a0769b75eade8a1fa7d4b8c8676bba1e2e83aa9e5e8a74c90b0ac2a67bb153e6dc09

  • C:\Users\Admin\AppData\Local\Temp\_MEI27482\python39.dll

    Filesize

    4.3MB

    MD5

    1d5e4c20a20740f38f061bdf48aaca4f

    SHA1

    de1b64ab5219aa6fef95cd2b0ccead1c925fd0d0

    SHA256

    f8172151d11bcf934f2a7518cd0d834e3f079bd980391e9da147ce4cff72c366

    SHA512

    9df64c97e4e993e815fdaf7e8ecbc3ce32aa8d979f8f4f7a732b2efa636cfeb9a145fe2c2dcdf2e5e9247ee376625e1fdc62f9657e8007bb504336ac8d05a397

  • C:\Users\Admin\AppData\Local\Temp\cmd.exe

    Filesize

    6.9MB

    MD5

    4621621eba5ceabfbfa7aa607a9d6a3d

    SHA1

    e86fbf0e414e60bbfd130007811844c11aaff1fd

    SHA256

    6b19078dd387b51fe3fb55a80d0fa36dbc30008b7bd4052297b3c9ab7fadd636

    SHA512

    93b25e9da281111e4cf8d542dd0847ae07f100d6f470097e11dad2bf8ead64b83acafcfc0a20c46058ecda2d8c02b3d28c68abc7951c833ac46af3921a6f4b08

  • C:\Users\Admin\AppData\Local\Temp\temp.exe

    Filesize

    128KB

    MD5

    1345c9556ce21d1a147ddd1ed6712a90

    SHA1

    0d74f412a719226802d1d8713037e62a3c9cb465

    SHA256

    ed991ad801b907dc8d39c87bdc3ec75ad50d076172b7e701009341aca9367842

    SHA512

    a705e351c234969579273e259477c876e2a9a1de7da91dbd4e9fe1d8c3c72ba274b48020d1bce9124c7542d4f050d3efb18b1c128eaff5efaa124fb719afa583

  • C:\Users\Admin\AppData\Local\Temp\tmp9147.tmp.bat

    Filesize

    151B

    MD5

    d1a2494dab8fa75ae46df03a771b151d

    SHA1

    d831474d34f2e42671a8a9192f8715ba3833ccfe

    SHA256

    2cb4178bae3a795a7b8429b708b8e9a53fb844d30c36f8204da39d5ae5dfedc8

    SHA512

    31c534f7802df277b8cee4e10a788ecb4c31bf8f53debd6a2e91424742ef51a7ada5dbfb1427dfc0cd260bad262a0f5107c4fb2825a379d9a26e2d8a5831909f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk

    Filesize

    1KB

    MD5

    175dcf91ef523df6166fc091918c8841

    SHA1

    e07af27597a939af81039147f404680d28f33850

    SHA256

    78be10b7e3783e797bfff8f3f5dcaab17d0612c508dd9259b046f8dab5cb89de

    SHA512

    6de78d023e2fb500944d7cbe2995b91bf98c54f97e8b36cefae5458c3c6e7b68eea3e3e746777bfad62d59b069bd3143d07f3c8d90dedb0d6eccd90fb8c79378

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk

    Filesize

    1022B

    MD5

    2003bb0332ddfd3d91153db0bd88564e

    SHA1

    32e60a8379db536b5037a7bf909289960369582b

    SHA256

    b3fd92b0ef90b98cb7d9ed6435266f9d8e364054038ce8490bd0d005ef144517

    SHA512

    be63a85396b5c4deefebd891c5997785708a27bcc6a95b3221328be4711b9315c57966de43503bec3a58c674238ce57aa401f6afcdcb4d66e9b5723c465b28d7

  • \Users\Admin\AppData\Local\Temp\ASE_2.EXE

    Filesize

    48KB

    MD5

    322973fcfa6811db872e6d3942bd7a8e

    SHA1

    4c9f630e248c4fdddba2b9095c427a34ac51042a

    SHA256

    d06417e9d191f55788b7a25e3e79bea3fdc981e8d8ab0b6eec89cb0a05b84932

    SHA512

    11c45414a09f10822c37d24f557bd619cb3a89559f644d0ee55919f5cfecce3ba174329b9088144872daebc0b94752d63edfdfbdfdfc5b2462551fd72cc9e75f

  • memory/476-79-0x0000000000A70000-0x0000000000A82000-memory.dmp

    Filesize

    72KB

  • memory/592-80-0x0000000001340000-0x000000000134E000-memory.dmp

    Filesize

    56KB

  • memory/1868-95-0x0000000001120000-0x0000000001132000-memory.dmp

    Filesize

    72KB

  • memory/1928-103-0x0000000000030000-0x000000000003E000-memory.dmp

    Filesize

    56KB

  • memory/2432-0-0x000007FEF5353000-0x000007FEF5354000-memory.dmp

    Filesize

    4KB

  • memory/2432-36-0x000007FEF5353000-0x000007FEF5354000-memory.dmp

    Filesize

    4KB

  • memory/2432-1-0x0000000000B20000-0x000000000122E000-memory.dmp

    Filesize

    7.1MB