Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js
-
Size
197KB
-
MD5
308d7ff7f284eed50cb29aedc8f3bb48
-
SHA1
3cf054753beb7c857c198b5def3804e29f3426ff
-
SHA256
380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9
-
SHA512
c393d34572c134d6ad6bb7b90598d04275f08f00b51d6acd2d4709df2460fe67ea347e4cd0baf8134cac9d776721f627601ea8ca9599147965220435cabac0be
-
SSDEEP
3072:31HYHcps3mbJHdLibcIdTDtf39sJb1kQAnF1Ea0pP+:3sMs2XeDd9fNEY
Malware Config
Extracted
asyncrat
0.5.7B
Default
franmhort.duia.ro:8153
Mutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
win.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c5e-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation AsyncClient.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js wscript.exe -
Executes dropped EXE 2 IoCs
pid Process 5032 AsyncClient.exe 2076 win.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9 = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js\"" wscript.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4296 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4348 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe 5032 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5032 AsyncClient.exe Token: SeDebugPrivilege 2076 win.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4244 wrote to memory of 1252 4244 wscript.exe 82 PID 4244 wrote to memory of 1252 4244 wscript.exe 82 PID 4244 wrote to memory of 3500 4244 wscript.exe 83 PID 4244 wrote to memory of 3500 4244 wscript.exe 83 PID 3500 wrote to memory of 1092 3500 wscript.exe 85 PID 3500 wrote to memory of 1092 3500 wscript.exe 85 PID 1252 wrote to memory of 5032 1252 wscript.exe 84 PID 1252 wrote to memory of 5032 1252 wscript.exe 84 PID 1252 wrote to memory of 5032 1252 wscript.exe 84 PID 5032 wrote to memory of 4500 5032 AsyncClient.exe 87 PID 5032 wrote to memory of 4500 5032 AsyncClient.exe 87 PID 5032 wrote to memory of 4500 5032 AsyncClient.exe 87 PID 5032 wrote to memory of 4960 5032 AsyncClient.exe 89 PID 5032 wrote to memory of 4960 5032 AsyncClient.exe 89 PID 5032 wrote to memory of 4960 5032 AsyncClient.exe 89 PID 4960 wrote to memory of 4296 4960 cmd.exe 91 PID 4960 wrote to memory of 4296 4960 cmd.exe 91 PID 4960 wrote to memory of 4296 4960 cmd.exe 91 PID 4500 wrote to memory of 4348 4500 cmd.exe 92 PID 4500 wrote to memory of 4348 4500 cmd.exe 92 PID 4500 wrote to memory of 4348 4500 cmd.exe 92 PID 4960 wrote to memory of 2076 4960 cmd.exe 93 PID 4960 wrote to memory of 2076 4960 cmd.exe 93 PID 4960 wrote to memory of 2076 4960 cmd.exe 93
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\WpkCGRDGea.js"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Roaming\AsyncClient.exe"C:\Users\Admin\AppData\Roaming\AsyncClient.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "win" /tr '"C:\Users\Admin\AppData\Roaming\win.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9402.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4296
-
-
C:\Users\Admin\AppData\Roaming\win.exe"C:\Users\Admin\AppData\Roaming\win.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
-
-
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js"2⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\WpkCGRDGea.js"3⤵PID:1092
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD55ce4d74c094d88b86dc877f332d1c10a
SHA19bb3f889b988562e8aff7a12cbca7f4d14d9158e
SHA25620df95d437390eec6c35214197122e07e8532c1cd97164c61b8085b94e348ecd
SHA512f528182ad1416752a59b1dd7828adbe039522cf5d6e3c81e0f4034db1b37ca3bf6b801ec0db05296889b1d14c3005b6f3bb037f4fe031f6e5266736885279e30
-
Filesize
45KB
MD5cbdce3b5e2939fe92312004dcb31151f
SHA16f11f275c611decd4659f23a4593103f327806a6
SHA2566ccc49875c2d837f462c4c3bd81f80b3be93f8435e8a22e042b5db025a31a6e3
SHA5126240f21957016db0607987c81b110e78640d20eeba2dc0274cf6e6741cfd7924ca3b42325405e620f423157c34f355f188dbf60de96421e87f0d53e271fcc2c8
-
C:\Users\Admin\AppData\Roaming\JaffaCakes118_380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9.js
Filesize197KB
MD5308d7ff7f284eed50cb29aedc8f3bb48
SHA13cf054753beb7c857c198b5def3804e29f3426ff
SHA256380afcca7c0cfc3e015be647a0b46fa4a2b56a213d8428db3a6503a737b2a0f9
SHA512c393d34572c134d6ad6bb7b90598d04275f08f00b51d6acd2d4709df2460fe67ea347e4cd0baf8134cac9d776721f627601ea8ca9599147965220435cabac0be
-
Filesize
90KB
MD518024bce1779bd2a699774f49a7ccb9e
SHA171d98c4b2509d40ebd128817051f8ca0271f3710
SHA25616240be574ce82b98e9484ff2e2fcbe087f62da6f2b35eb38a67df109ee2803c
SHA512d92c8e3b8e5b6225bd8a0f94a445fef52d012c20feccee8d4c7f3591ce6a806f83050a95780862f1acb6b18ba41a766043f9f7d1397bec0660043bb5d05696c3