Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe
-
Size
414KB
-
MD5
f569525615c7585c5e54720d11bc1ab7
-
SHA1
c0f6869db5365d4be5c7f381f10175f18eb9b95c
-
SHA256
e40dd437b2cad30c5fa480ce932710e4121630d9d48aba6c8527a3d6f006ea21
-
SHA512
603cac841e9168d3ac7e4502d1f3f481e624854a6fe4265a53333b0adcafc1daaaee91e0694d6a82c2c061a108a8d71f371c7b1abd6ee1d9e76c437c96bcbed3
-
SSDEEP
3072:0D32GhNvy+CFkUtzqJUtIFwl2BaxTXnY+nVugK0ia/Ch501GB2qwUxe0:U2GhN6bFkUtmloxBVvJK50kgqwU
Malware Config
Extracted
asyncrat
0.5.7B
Default
pornox.ddns.net:5552
ok
-
delay
3
-
install
true
-
install_file
WindowsShortcut.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000016875-5.dat family_asyncrat -
Executes dropped EXE 2 IoCs
pid Process 1940 WindowsSecurity.bat 2780 WindowsShortcut.exe -
Loads dropped DLL 2 IoCs
pid Process 108 f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe 2764 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsSecurity.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsShortcut.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2904 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1940 WindowsSecurity.bat 1940 WindowsSecurity.bat 1940 WindowsSecurity.bat -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1940 WindowsSecurity.bat Token: SeDebugPrivilege 2780 WindowsShortcut.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 108 wrote to memory of 1940 108 f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe 30 PID 108 wrote to memory of 1940 108 f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe 30 PID 108 wrote to memory of 1940 108 f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe 30 PID 108 wrote to memory of 1940 108 f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe 30 PID 1940 wrote to memory of 320 1940 WindowsSecurity.bat 32 PID 1940 wrote to memory of 320 1940 WindowsSecurity.bat 32 PID 1940 wrote to memory of 320 1940 WindowsSecurity.bat 32 PID 1940 wrote to memory of 320 1940 WindowsSecurity.bat 32 PID 1940 wrote to memory of 2764 1940 WindowsSecurity.bat 34 PID 1940 wrote to memory of 2764 1940 WindowsSecurity.bat 34 PID 1940 wrote to memory of 2764 1940 WindowsSecurity.bat 34 PID 1940 wrote to memory of 2764 1940 WindowsSecurity.bat 34 PID 320 wrote to memory of 2864 320 cmd.exe 36 PID 320 wrote to memory of 2864 320 cmd.exe 36 PID 320 wrote to memory of 2864 320 cmd.exe 36 PID 320 wrote to memory of 2864 320 cmd.exe 36 PID 2764 wrote to memory of 2904 2764 cmd.exe 37 PID 2764 wrote to memory of 2904 2764 cmd.exe 37 PID 2764 wrote to memory of 2904 2764 cmd.exe 37 PID 2764 wrote to memory of 2904 2764 cmd.exe 37 PID 2764 wrote to memory of 2780 2764 cmd.exe 38 PID 2764 wrote to memory of 2780 2764 cmd.exe 38 PID 2764 wrote to memory of 2780 2764 cmd.exe 38 PID 2764 wrote to memory of 2780 2764 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\WindowsSecurity.bat"C:\Users\Admin\AppData\Local\Temp\WindowsSecurity.bat"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsShortcut" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsShortcut.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsShortcut" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsShortcut.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpCF31.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\WindowsShortcut.exe"C:\Users\Admin\AppData\Local\Temp\WindowsShortcut.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162B
MD55701b9ba457438a9d031952c241c6682
SHA14c58e1e42ba04da7bc78915a8913d02ec08723ad
SHA256edfd0b613c549920fedbde4bf8c45487ff740fdf9295ee02899c66c7b9a92391
SHA5123d1ee623c606dae4b74050427126d2d43e59d90fa56c1287ba951b04c307cdd6b76e91cf0457498dd6d7641c7b7d2325acabf9dade5cf681e028e8b595498c26
-
Filesize
47KB
MD52c24055f43f371dbf0e7a3ff2c43dfd4
SHA1bf7625ce4c23aabd0c75a92dbbc0d5fe75d138c2
SHA2566ddf626b13e883ad07c72ff1f135015d47ff81dc82e0c9759690d4448636178d
SHA51263585a42f3b96f72cb591994c636242a4858483d010b1d71a02f440167aee3a9a17007d035c77dcc7f6f4cb341d8a766b62eb69651504236b2c594fca602250a