Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
c05361b9adb7aab5598de6a0b96e2826
-
SHA1
c5f9c3bf4c8b287a0cfa429d8365fb39345fb2bd
-
SHA256
9070061c6f0ca4fe0170ae5b64ec0ef4342bd2f83821d9e07e43eb3cc6a3e4b8
-
SHA512
50bc04db9d5679792f65124826084b6541fed2e6933de380edf66a2df87a8209957eba6b5c35a6beba215446c64837b22142654978e858e8deb2e4838687c39c
-
SSDEEP
24576:D09tv9/7JtDElDEExIko2H2HESq2eWJ6MQjySjy+b4+p6:D09XJt4HIN2H2tFvduySO+Y
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2824-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2824-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2824-12-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2808-24-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2692-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2692-71-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2692-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2692-72-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2824-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2824-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2824-12-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2808-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2808-24-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2692-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2692-71-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2692-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2692-72-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
pid Process 2824 RVN.exe 2808 TXPlatforn.exe 2692 TXPlatforn.exe 2552 HD_c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Loads dropped DLL 3 IoCs
pid Process 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 2808 TXPlatforn.exe 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
resource yara_rule behavioral1/memory/2824-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2824-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2824-12-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2824-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2808-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2808-24-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2692-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2692-71-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2692-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2692-72-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2856 cmd.exe 2916 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2916 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2692 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2824 RVN.exe Token: SeLoadDriverPrivilege 2692 TXPlatforn.exe Token: 33 2692 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2692 TXPlatforn.exe Token: 33 2692 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2692 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2824 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2824 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2824 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2824 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2824 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2824 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 30 PID 2776 wrote to memory of 2824 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2856 2824 RVN.exe 32 PID 2824 wrote to memory of 2856 2824 RVN.exe 32 PID 2824 wrote to memory of 2856 2824 RVN.exe 32 PID 2824 wrote to memory of 2856 2824 RVN.exe 32 PID 2808 wrote to memory of 2692 2808 TXPlatforn.exe 34 PID 2808 wrote to memory of 2692 2808 TXPlatforn.exe 34 PID 2808 wrote to memory of 2692 2808 TXPlatforn.exe 34 PID 2808 wrote to memory of 2692 2808 TXPlatforn.exe 34 PID 2808 wrote to memory of 2692 2808 TXPlatforn.exe 34 PID 2808 wrote to memory of 2692 2808 TXPlatforn.exe 34 PID 2808 wrote to memory of 2692 2808 TXPlatforn.exe 34 PID 2776 wrote to memory of 2552 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 35 PID 2776 wrote to memory of 2552 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 35 PID 2776 wrote to memory of 2552 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 35 PID 2776 wrote to memory of 2552 2776 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 35 PID 2856 wrote to memory of 2916 2856 cmd.exe 36 PID 2856 wrote to memory of 2916 2856 cmd.exe 36 PID 2856 wrote to memory of 2916 2856 cmd.exe 36 PID 2856 wrote to memory of 2916 2856 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\HD_c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341KB
MD5e16dd9faeca97b4c185426e5672becba
SHA1f32087a346bcc58dedcfe1bc32f221d486a385c7
SHA256c21bfc263890f02763f56b4e9f5cf9113656cf09d7864b53ec2fd2024bdadd60
SHA512582180e0c7b35660114d5b1d4d5c92d75615321a74d160c2c7bc92b91a2c2b7ed758d63e2bbbdb1658992da6fe7ac546d7f4ea9a6c73a4a503989ea6e1a22d6a
-
Filesize
1.4MB
MD57ae3f05b8dede7f5e309d56f2a567090
SHA1d398dcf1b009a47d42b5a8243744dc190d5c58a7
SHA256f0edfdc98a3f8ec4a1ed49ec59fdcfa0172228427a8ab1bc954dae01de4c93e9
SHA512e54689a4e839ff4a5cb565a2afb84365312d866ede07b43fd1e8666e052901f9ad17e861b4a6144ce800e0032a5341877529b49edf8d60ba737bd06f247011ff
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4