Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
dfce4c5c593fa3214aa5f4e3035db47e
-
SHA1
9d2eda532cd0593d0d576d716f374d7aa2984c79
-
SHA256
429a73f74045a5a0a48f5f17b1172ee5417073af343b4522097ebc94debe2cc9
-
SHA512
7b4d7ff7b881702f4325269f2e8662a9048a44ac9b13996b7c3e88143198231aaa4d8f52ead148cbccb3f17a6188b1c6826691abc0e71331abda264e02a84e1b
-
SSDEEP
49152:TEBuM9t97iv8lUNqJpjYzVYvClJByC0v3UmDASq4bCxco5mzK:
Malware Config
Extracted
bitrat
1.38
31.210.20.236:4444
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Signatures
-
Bitrat family
-
Executes dropped EXE 1 IoCs
pid Process 2644 MSBuild.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2644 MSBuild.exe 2644 MSBuild.exe 2644 MSBuild.exe 2644 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2364 set thread context of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2380 powershell.exe 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeDebugPrivilege 2644 MSBuild.exe Token: SeShutdownPrivilege 2644 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 MSBuild.exe 2644 MSBuild.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2380 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 32 PID 2364 wrote to memory of 2380 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 32 PID 2364 wrote to memory of 2380 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 32 PID 2364 wrote to memory of 2380 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 32 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34 PID 2364 wrote to memory of 2644 2364 dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfce4c5c593fa3214aa5f4e3035db47e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-NetConnection -TraceRoute twitter.com2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD59af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3