Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe
-
Size
63KB
-
MD5
8ca274dbc58ebc02871890568d974f8d
-
SHA1
3aeefa2a74cfa452f7ede84628ccbeccd6112c10
-
SHA256
e65c8b7adef2d900a2041507d873cc2afc0ed5aeaee401823340e635af7a4470
-
SHA512
82dc3cf039d75b0c3c92cb4b8ba4bcc911b73f732b08c0d60c186fb73c65a5d391a16b4284ac9b8366254c407158d17b80accfc21c78a5871b396561d4d68fe5
-
SSDEEP
1536:QCQ1bX2UG2m9mIznhAyVCBjfWLJ2V3kYIjmeQhGBK0zi9:Pa+PNApkYICw+
Malware Config
Extracted
limerat
-
aes_key
pundek
-
antivm
false
-
c2_url
https://pastebin.com/raw/7sALhsP2
-
delay
3
-
download_payload
false
-
install
true
-
install_name
Secure.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
false
Extracted
limerat
-
antivm
false
-
c2_url
https://pastebin.com/raw/7sALhsP2
-
download_payload
false
-
install
false
-
pin_spread
false
-
usb_spread
false
Signatures
-
Limerat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
Secure.exepid process 4588 Secure.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Secure.exedescription pid process Token: SeDebugPrivilege 4588 Secure.exe Token: SeDebugPrivilege 4588 Secure.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exedescription pid process target process PID 3752 wrote to memory of 3468 3752 8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe schtasks.exe PID 3752 wrote to memory of 3468 3752 8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe schtasks.exe PID 3752 wrote to memory of 4588 3752 8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe Secure.exe PID 3752 wrote to memory of 4588 3752 8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe Secure.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ca274dbc58ebc02871890568d974f8d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /f /sc ONLOGON /RL HIGHEST /tn LimeRAT-Admin /tr "'C:\Users\Admin\AppData\Local\Temp\Secure.exe'"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\Secure.exe"C:\Users\Admin\AppData\Local\Temp\Secure.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD58ca274dbc58ebc02871890568d974f8d
SHA13aeefa2a74cfa452f7ede84628ccbeccd6112c10
SHA256e65c8b7adef2d900a2041507d873cc2afc0ed5aeaee401823340e635af7a4470
SHA51282dc3cf039d75b0c3c92cb4b8ba4bcc911b73f732b08c0d60c186fb73c65a5d391a16b4284ac9b8366254c407158d17b80accfc21c78a5871b396561d4d68fe5