Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe
-
Size
71KB
-
MD5
aa77429a62c8f4a59bdc82c5258c9123
-
SHA1
eb1508f0a2e3a5d86cb348e1760d86073d879255
-
SHA256
4839de6c2774ef432d84630f204abe3b6505721a7aa1875bc523b10c1857e14d
-
SHA512
1dfbedb0b43361d2daca1e2eb35930bac2b9945f640fd54a5bb9b026b9ba1f22959041170dd968daa58cdfff27f911e6048237db6b870941152bf4cccf78eadb
-
SSDEEP
1536:9syCnOnVDIiC0WqhOVqijqLGwXjwN7cxtWuf4kImOJI4kcIr:yjnOJIiJWqhMqSwX0N7cx9zOI4kc
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/875342035450732574/VfRKUe0abDxr5_1cWoOMyQRCf1ABdhs1NhJZUSLZnx8ZgnVye6IKnRT5s7fVjsUbsi_X
-
payload_url
https://cdn.discordapp.com/attachments/751900698802782343/751901202178113729/bdb1cfc204098a6920a413c3c5ddfb36.png
Signatures
-
Growtopia family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exedescription pid Process procid_target PID 1620 set thread context of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2608 2964 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exeRegAsm.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exepid Process 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exeRegAsm.exedescription pid Process procid_target PID 1620 wrote to memory of 2780 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 31 PID 1620 wrote to memory of 2780 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 31 PID 1620 wrote to memory of 2780 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 31 PID 1620 wrote to memory of 2780 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 31 PID 1620 wrote to memory of 2780 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 31 PID 1620 wrote to memory of 2780 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 31 PID 1620 wrote to memory of 2780 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 31 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 1620 wrote to memory of 2964 1620 aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe 32 PID 2964 wrote to memory of 2608 2964 RegAsm.exe 34 PID 2964 wrote to memory of 2608 2964 RegAsm.exe 34 PID 2964 wrote to memory of 2608 2964 RegAsm.exe 34 PID 2964 wrote to memory of 2608 2964 RegAsm.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa77429a62c8f4a59bdc82c5258c9123_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2780
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 8563⤵
- Program crash
PID:2608
-
-