Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 01:33
Behavioral task
behavioral1
Sample
JaffaCakes118_cbbced5ccc483f9acfd0f96acf8944798dec06b6541ede54d01877df6e47c44d.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_cbbced5ccc483f9acfd0f96acf8944798dec06b6541ede54d01877df6e47c44d.exe
-
Size
1.1MB
-
MD5
dafad1d426889ba283eac46ba73cced2
-
SHA1
16f2652749c23f426ac0bc85907ec3816c56cf56
-
SHA256
cbbced5ccc483f9acfd0f96acf8944798dec06b6541ede54d01877df6e47c44d
-
SHA512
363a0c8d1afb8591cd3f2b6ce0409afd5fa588150f1f0d2532886e19df4d83e47de76724e04b312378fdb64805240a998f61f706e5a89939df84573d1b582399
-
SSDEEP
24576:pr1LQJJtK3D0E5Xyi/NMdCRnqcyl6ieU9AiteAb3VNqSAeCfGJs9271UyQ2/q:NlQxgyi/CoRn5+gU9Au7rAeCfGJs9270
Malware Config
Extracted
asyncrat
ANC8.0
DATA2
154.211.6.212:8848
DefaultT
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/3068-1-0x0000000000400000-0x0000000000526000-memory.dmp family_asyncrat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_cbbced5ccc483f9acfd0f96acf8944798dec06b6541ede54d01877df6e47c44d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cbbced5ccc483f9acfd0f96acf8944798dec06b6541ede54d01877df6e47c44d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_cbbced5ccc483f9acfd0f96acf8944798dec06b6541ede54d01877df6e47c44d.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3068