Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe
-
Size
414KB
-
MD5
f569525615c7585c5e54720d11bc1ab7
-
SHA1
c0f6869db5365d4be5c7f381f10175f18eb9b95c
-
SHA256
e40dd437b2cad30c5fa480ce932710e4121630d9d48aba6c8527a3d6f006ea21
-
SHA512
603cac841e9168d3ac7e4502d1f3f481e624854a6fe4265a53333b0adcafc1daaaee91e0694d6a82c2c061a108a8d71f371c7b1abd6ee1d9e76c437c96bcbed3
-
SSDEEP
3072:0D32GhNvy+CFkUtzqJUtIFwl2BaxTXnY+nVugK0ia/Ch501GB2qwUxe0:U2GhN6bFkUtmloxBVvJK50kgqwU
Malware Config
Extracted
asyncrat
0.5.7B
Default
pornox.ddns.net:5552
ok
-
delay
3
-
install
true
-
install_file
WindowsShortcut.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b69-9.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation WindowsSecurity.bat -
Executes dropped EXE 2 IoCs
pid Process 4048 WindowsSecurity.bat 2940 WindowsShortcut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsSecurity.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsShortcut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1704 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat 4048 WindowsSecurity.bat -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4048 WindowsSecurity.bat Token: SeDebugPrivilege 2940 WindowsShortcut.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3084 wrote to memory of 4048 3084 f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe 82 PID 3084 wrote to memory of 4048 3084 f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe 82 PID 3084 wrote to memory of 4048 3084 f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe 82 PID 4048 wrote to memory of 1736 4048 WindowsSecurity.bat 83 PID 4048 wrote to memory of 1736 4048 WindowsSecurity.bat 83 PID 4048 wrote to memory of 1736 4048 WindowsSecurity.bat 83 PID 4048 wrote to memory of 1872 4048 WindowsSecurity.bat 85 PID 4048 wrote to memory of 1872 4048 WindowsSecurity.bat 85 PID 4048 wrote to memory of 1872 4048 WindowsSecurity.bat 85 PID 1872 wrote to memory of 1704 1872 cmd.exe 87 PID 1872 wrote to memory of 1704 1872 cmd.exe 87 PID 1872 wrote to memory of 1704 1872 cmd.exe 87 PID 1736 wrote to memory of 1376 1736 cmd.exe 88 PID 1736 wrote to memory of 1376 1736 cmd.exe 88 PID 1736 wrote to memory of 1376 1736 cmd.exe 88 PID 1872 wrote to memory of 2940 1872 cmd.exe 89 PID 1872 wrote to memory of 2940 1872 cmd.exe 89 PID 1872 wrote to memory of 2940 1872 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f569525615c7585c5e54720d11bc1ab7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\WindowsSecurity.bat"C:\Users\Admin\AppData\Local\Temp\WindowsSecurity.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsShortcut" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsShortcut.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsShortcut" /tr '"C:\Users\Admin\AppData\Local\Temp\WindowsShortcut.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9933.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\WindowsShortcut.exe"C:\Users\Admin\AppData\Local\Temp\WindowsShortcut.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD52c24055f43f371dbf0e7a3ff2c43dfd4
SHA1bf7625ce4c23aabd0c75a92dbbc0d5fe75d138c2
SHA2566ddf626b13e883ad07c72ff1f135015d47ff81dc82e0c9759690d4448636178d
SHA51263585a42f3b96f72cb591994c636242a4858483d010b1d71a02f440167aee3a9a17007d035c77dcc7f6f4cb341d8a766b62eb69651504236b2c594fca602250a
-
Filesize
162B
MD50855d54e1a37ef65288b634520f0550c
SHA107b5b1e5ed2b0dcc62176e2418d0075fe9363a95
SHA25676c01e3c57640f2a8f966d579817251ce2830f728b4d6a2997dacecedc8a944f
SHA5127181e55c3f44285bf6a60c3304123ff8afedb3f559605874f8dd8cdbb1e37c4ecdc755cb241f44f62414667d23621faa13ba5b22fab11b56f6b04f36f8bb1fdb