Overview
overview
10Static
static
559acf29870...18.exe
windows7-x64
1059acf29870...18.exe
windows10-2004-x64
10Adobe-GenP-2.7.exe
windows7-x64
3Adobe-GenP-2.7.exe
windows10-2004-x64
3ETC1final.exe
windows7-x64
8ETC1final.exe
windows10-2004-x64
8XMRfinal.exe
windows7-x64
8XMRfinal.exe
windows10-2004-x64
10update.exe
windows7-x64
10update.exe
windows10-2004-x64
10General
-
Target
59acf298702bd7b13089a8883460fde5_JaffaCakes118
-
Size
1.3MB
-
Sample
241018-2h95estgqj
-
MD5
59acf298702bd7b13089a8883460fde5
-
SHA1
3d757f96fb6fa2b2020c3072f7dfebcaddca59ab
-
SHA256
cae246e1b4386518005749ac3958c4506d448f1f7efdd49d839dd10a5e01be2b
-
SHA512
6e2b0b52d498d3c77cba2fa1ce348d0c5d15bea12065df52209c312db28f7a783cdd05905a9b2b418f25d171266f173a14dd0b48721a24bac48dd461e268d52e
-
SSDEEP
24576:seKBtGLmFZsPlMD7KleDlws8zqUNdKfYupom0LdeTUw1Z5gOENl2for92Pvolxv:seKBtfgG7KylX8FwUrdtw1zEL2for90e
Static task
static1
Behavioral task
behavioral1
Sample
59acf298702bd7b13089a8883460fde5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
59acf298702bd7b13089a8883460fde5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Adobe-GenP-2.7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Adobe-GenP-2.7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ETC1final.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ETC1final.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
XMRfinal.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
XMRfinal.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
update.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
update.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
service32.sytes.net:8848
NFHaufhauiwfhawfw
-
delay
1
-
install
false
-
install_file
vmdservice.exe
-
install_folder
%AppData%
Targets
-
-
Target
59acf298702bd7b13089a8883460fde5_JaffaCakes118
-
Size
1.3MB
-
MD5
59acf298702bd7b13089a8883460fde5
-
SHA1
3d757f96fb6fa2b2020c3072f7dfebcaddca59ab
-
SHA256
cae246e1b4386518005749ac3958c4506d448f1f7efdd49d839dd10a5e01be2b
-
SHA512
6e2b0b52d498d3c77cba2fa1ce348d0c5d15bea12065df52209c312db28f7a783cdd05905a9b2b418f25d171266f173a14dd0b48721a24bac48dd461e268d52e
-
SSDEEP
24576:seKBtGLmFZsPlMD7KleDlws8zqUNdKfYupom0LdeTUw1Z5gOENl2for92Pvolxv:seKBtfgG7KylX8FwUrdtw1zEL2for90e
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
Adobe-GenP-2.7.exe
-
Size
1.3MB
-
MD5
6467e9dd5d86c741aed49060e6d3fcd2
-
SHA1
a3c784836d993cc2cd9a9087a23559fa05567d02
-
SHA256
7b8d9ff34315e1787cdb62e682b3ba8dedd9f28d7cd374afe057babaf335edd4
-
SHA512
9f3b46f4b4c2839e2cd6c6ca2fb2b859af0e22a9c8276b26b32c83ca5f9d95c3cefb44cd82dc78cbe427de04e92e86ceface836f45c3263a8a5a1ca7c1dc48e7
-
SSDEEP
24576:fRaZROMOm8FN7TjsPnzt2heeRhQbJEOeamXHeqtGHXR0LSeIU6:5kxOm+7TjsPnztyDMmaSHeqtyX8Sg
Score3/10 -
-
-
Target
ETC1final.exe
-
Size
31KB
-
MD5
e6eef993d7cdd5b5d3ba14c22ba7347b
-
SHA1
921bcf0d4bf3fd3cebd706a6e9dfe3901e32caea
-
SHA256
c84043ea0e8a98b478bbe03bfc16f0d64de4eb3e99ea5f7717b5d37843fe247e
-
SHA512
f832a156d8bfb45a81806563265bc78712a3cdfe7217efdd7515d5a01b846416f362a41ea97037e02461ce971ce9548e4265a84baa480af05d36223e994272bf
-
SSDEEP
384:mlkzbsJHRdKputWQjjNut9r/npRqUC3x1nSpPdk1AOPBmMai6iFQwCADa2JE6sO/:2kzbs1cEcnTr8nSEKOPBbaQFRlEs/3
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
-
-
Target
XMRfinal.exe
-
Size
45KB
-
MD5
34c74daeeaf8a3aab61553a507b329c7
-
SHA1
8a28ede427de7fc4088a8ababe018c2284b93c2b
-
SHA256
8ad91fe964e0a868a0260a6142a94a2b7fa930be6d79fff4dbe199f38f7be17b
-
SHA512
114571ba25987bdbdb623d233bd9f52b9ff049ce52723cc0e68d715eed633c62b604e95ec8191e2bda10fe6aaa55d63ccbc1f9af36f2a6d11d2ac744ee2adf73
-
SSDEEP
768:rkbsy4kAcpYHEX1DwaLwRpeP5YlsDpqcO6TlJmOh4bIDX3aan2yyhYnLNqgXi2f:4bsVcbNGcpjO4jmI4sKjyBNfXzf
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
-
-
Target
update.exe
-
Size
375KB
-
MD5
3ea6458b6a66860e0b494f4d23d80991
-
SHA1
e32f4c1d1601997a6c3a5745de5be87b84ffb167
-
SHA256
005e7927bf7df1153921f511ac3fe6527f039db911cec0d9ad7201bfa65054bf
-
SHA512
44487f251fd8f9f0a0adfaf7da10da43a58d22b3332cf15a8d88a407c56838f331468eb249d995a28a57c0992361c810501c0062be53791d12000df267ab5cee
-
SSDEEP
6144:kqzLj+4PhWh/WBdhK2f7qDyFNQwprWEBX5r95yIpFyBNhg5OD6t+hjCMSsCmvEs3:R3j+4YEB/K2f777prWEBD5nu+5OD6sYq
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1