Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/10/2024, 22:24

General

  • Target

    763f49b886470aca855818c2bafe808f_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    763f49b886470aca855818c2bafe808f

  • SHA1

    aa734d2d9cf04c6b497ec133b6f3672c57b7b876

  • SHA256

    0c73474ceb5c96ff4c0231b9d542d65c1d78b82de926bbfd4413d81684d78e58

  • SHA512

    2e7faab1b5558f74385562ef1b28981a9bc713b067a8bdacf9b6aaca068c0307e5bf1a8d676cb1e9225e939224772f01c52766b9993688c26a680e97d97af604

  • SSDEEP

    49152:9qv05wmNYoKlRoXEg7oFuJEmkSMiZTMxtTITsY:Es5wuKYXEWkSPTMxSTJ

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\763f49b886470aca855818c2bafe808f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\763f49b886470aca855818c2bafe808f_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4588-0-0x00000000001A0000-0x0000000000860000-memory.dmp

    Filesize

    6.8MB

  • memory/4588-4-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-7-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-8-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-6-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-5-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-9-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-3-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-2-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-1-0x0000000076A60000-0x0000000076A61000-memory.dmp

    Filesize

    4KB

  • memory/4588-13-0x00000000001A0000-0x0000000000860000-memory.dmp

    Filesize

    6.8MB

  • memory/4588-14-0x00000000060F0000-0x0000000006694000-memory.dmp

    Filesize

    5.6MB

  • memory/4588-15-0x0000000006CC0000-0x00000000072D8000-memory.dmp

    Filesize

    6.1MB

  • memory/4588-16-0x0000000005CA0000-0x0000000005D32000-memory.dmp

    Filesize

    584KB

  • memory/4588-17-0x0000000005C70000-0x0000000005C82000-memory.dmp

    Filesize

    72KB

  • memory/4588-18-0x0000000005D80000-0x0000000005DBC000-memory.dmp

    Filesize

    240KB

  • memory/4588-19-0x0000000006050000-0x000000000609C000-memory.dmp

    Filesize

    304KB

  • memory/4588-20-0x0000000006840000-0x000000000694A000-memory.dmp

    Filesize

    1.0MB

  • memory/4588-21-0x00000000001A0000-0x0000000000860000-memory.dmp

    Filesize

    6.8MB

  • memory/4588-22-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-23-0x0000000076A60000-0x0000000076A61000-memory.dmp

    Filesize

    4KB

  • memory/4588-24-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-25-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-26-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-27-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-28-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-29-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB

  • memory/4588-31-0x0000000076A40000-0x0000000076B30000-memory.dmp

    Filesize

    960KB