Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
c05361b9adb7aab5598de6a0b96e2826
-
SHA1
c5f9c3bf4c8b287a0cfa429d8365fb39345fb2bd
-
SHA256
9070061c6f0ca4fe0170ae5b64ec0ef4342bd2f83821d9e07e43eb3cc6a3e4b8
-
SHA512
50bc04db9d5679792f65124826084b6541fed2e6933de380edf66a2df87a8209957eba6b5c35a6beba215446c64837b22142654978e858e8deb2e4838687c39c
-
SSDEEP
24576:D09tv9/7JtDElDEExIko2H2HESq2eWJ6MQjySjy+b4+p6:D09XJt4HIN2H2tFvduySO+Y
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2944-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2944-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2944-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4008-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4008-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4008-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4656-26-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4008-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4656-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4656-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4656-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral2/memory/2944-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2944-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2944-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4008-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4008-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4008-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4656-26-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4008-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4656-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4656-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4656-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
pid Process 2944 RVN.exe 4008 TXPlatforn.exe 4656 TXPlatforn.exe 2584 HD_c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
resource yara_rule behavioral2/memory/2944-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2944-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2944-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2944-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4008-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4008-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4008-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4008-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4656-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4008-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4656-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4656-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4656-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4420 cmd.exe 2184 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2184 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4656 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2944 RVN.exe Token: SeLoadDriverPrivilege 4656 TXPlatforn.exe Token: 33 4656 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4656 TXPlatforn.exe Token: 33 4656 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4656 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3752 wrote to memory of 2944 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 83 PID 3752 wrote to memory of 2944 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 83 PID 3752 wrote to memory of 2944 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 83 PID 2944 wrote to memory of 4420 2944 RVN.exe 85 PID 2944 wrote to memory of 4420 2944 RVN.exe 85 PID 2944 wrote to memory of 4420 2944 RVN.exe 85 PID 4008 wrote to memory of 4656 4008 TXPlatforn.exe 86 PID 4008 wrote to memory of 4656 4008 TXPlatforn.exe 86 PID 4008 wrote to memory of 4656 4008 TXPlatforn.exe 86 PID 3752 wrote to memory of 2584 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 87 PID 3752 wrote to memory of 2584 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 87 PID 3752 wrote to memory of 2584 3752 c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe 87 PID 4420 wrote to memory of 2184 4420 cmd.exe 89 PID 4420 wrote to memory of 2184 4420 cmd.exe 89 PID 4420 wrote to memory of 2184 4420 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\HD_c05361b9adb7aab5598de6a0b96e2826_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD57ae3f05b8dede7f5e309d56f2a567090
SHA1d398dcf1b009a47d42b5a8243744dc190d5c58a7
SHA256f0edfdc98a3f8ec4a1ed49ec59fdcfa0172228427a8ab1bc954dae01de4c93e9
SHA512e54689a4e839ff4a5cb565a2afb84365312d866ede07b43fd1e8666e052901f9ad17e861b4a6144ce800e0032a5341877529b49edf8d60ba737bd06f247011ff
-
Filesize
341KB
MD5e16dd9faeca97b4c185426e5672becba
SHA1f32087a346bcc58dedcfe1bc32f221d486a385c7
SHA256c21bfc263890f02763f56b4e9f5cf9113656cf09d7864b53ec2fd2024bdadd60
SHA512582180e0c7b35660114d5b1d4d5c92d75615321a74d160c2c7bc92b91a2c2b7ed758d63e2bbbdb1658992da6fe7ac546d7f4ea9a6c73a4a503989ea6e1a22d6a
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4