Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe
-
Size
958KB
-
MD5
346429703abf3da7cb4dae7e1d7762d5
-
SHA1
6bd5c22fecaa2aa5f4fb1520559578eb58f6f4eb
-
SHA256
a4c1fac56d90b4e04cbb6882b82e8ca5be9ea05d41daf591aeec2f8a2ed01190
-
SHA512
e4bd329565adddc05259b2922e28984a53a373e18735fd19c2d7b128b064598dc93527644d7d9774e2329643c9a96b7e05dbc2ea23c92c8de4c49c7582c63e9f
-
SSDEEP
6144:oAyQu6Uq2jvnC8NWo7ifUfph9/U2GaSGO990AEVf+VC:1UpDCUWqifek29SGi0FVfqC
Malware Config
Extracted
limerat
3GRaJ52TdJNnEZKLh8wvbmhPxr6Tf97C8L
-
aes_key
NyanCat
-
antivm
true
-
c2_url
https://pastebin.com/raw/N3exjfnX
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Nvidia GPU.exe
-
main_folder
UserProfile
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 Nvidia GPU.exe -
Loads dropped DLL 1 IoCs
pid Process 2748 RegSvcs.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2096 set thread context of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nvidia GPU.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2448 schtasks.exe 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2844 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 32 PID 2096 wrote to memory of 2844 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 32 PID 2096 wrote to memory of 2844 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 32 PID 2096 wrote to memory of 2844 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 32 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2096 wrote to memory of 2748 2096 346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe 34 PID 2748 wrote to memory of 2448 2748 RegSvcs.exe 35 PID 2748 wrote to memory of 2448 2748 RegSvcs.exe 35 PID 2748 wrote to memory of 2448 2748 RegSvcs.exe 35 PID 2748 wrote to memory of 2448 2748 RegSvcs.exe 35 PID 2748 wrote to memory of 2388 2748 RegSvcs.exe 37 PID 2748 wrote to memory of 2388 2748 RegSvcs.exe 37 PID 2748 wrote to memory of 2388 2748 RegSvcs.exe 37 PID 2748 wrote to memory of 2388 2748 RegSvcs.exe 37 PID 2748 wrote to memory of 2388 2748 RegSvcs.exe 37 PID 2748 wrote to memory of 2388 2748 RegSvcs.exe 37 PID 2748 wrote to memory of 2388 2748 RegSvcs.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\346429703abf3da7cb4dae7e1d7762d5_JaffaCakes118.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DdvcawZnc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp43D4.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\Nvidia GPU.exe'"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2448
-
-
C:\Users\Admin\Nvidia GPU.exe"C:\Users\Admin\Nvidia GPU.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD567c3ac1ed22adf3159797f2c3fc0023a
SHA15c8d5996cfea53a00487957d218e6530b34562da
SHA256af31cc7c9e15d3ccfbdcaff7261433ebce7988537f75e96be3e655c4c9a9ce54
SHA512f02d9d358608c26203eca9a8972ddca6bb31de7e777f100adc63e358373bd597d721d6e2211ab69cf72fe53dc204f4109fc909a70748a831e64343409f0aaee9
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215