Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 23:22
Behavioral task
behavioral1
Sample
JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe
-
Size
72KB
-
MD5
36d24132150e820598e182d2f51b35b6
-
SHA1
a1773014c2f0ac1dafc87f3e8d6cd2f697417eae
-
SHA256
e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71
-
SHA512
f6da08a584e74bdc2f9f7ea611fc49cfacc8bea3e301c86b53d8c0354028e245b6d9f0149a98207023fcbb9b5561f177e6835e16dfbb2f3d6a343569c0440350
-
SSDEEP
768:YoBLMxx0Fs4G7WHNw13wRCn1OCDyjb5gr3ir/u2lj4/aJClZl2tYcFmVc6Ka:YoBLMxmcAUVebWrSrGsgPrlKmVcla
Malware Config
Extracted
asyncrat
0.5.6D
Default
milla.publicvm.com:6606
milla.publicvm.com:7707
milla.publicvm.com:8808
tytfuzulyxhydjlicv
-
delay
8
-
install
true
-
install_file
expanda.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b64-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe -
Executes dropped EXE 1 IoCs
pid Process 4280 expanda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 640 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3652 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe Token: SeDebugPrivilege 4280 expanda.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4496 wrote to memory of 1048 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 86 PID 4496 wrote to memory of 1048 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 86 PID 4496 wrote to memory of 2176 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 88 PID 4496 wrote to memory of 2176 4496 JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe 88 PID 1048 wrote to memory of 3652 1048 cmd.exe 90 PID 1048 wrote to memory of 3652 1048 cmd.exe 90 PID 2176 wrote to memory of 640 2176 cmd.exe 91 PID 2176 wrote to memory of 640 2176 cmd.exe 91 PID 2176 wrote to memory of 4280 2176 cmd.exe 96 PID 2176 wrote to memory of 4280 2176 cmd.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /ru system /rl highest /tn JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71 /tr '"C:\Users\Admin\AppData\Roaming\expanda.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /ru system /rl highest /tn JaffaCakes118_e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71 /tr '"C:\Users\Admin\AppData\Roaming\expanda.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA4CB.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:640
-
-
C:\Users\Admin\AppData\Roaming\expanda.exe"C:\Users\Admin\AppData\Roaming\expanda.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5d61122f195c201bec7fb8f38fcffc04c
SHA1f85e8e658ec8f28703f93158213bdba2fa46d401
SHA256384b8b06595e0609d4380bda86e5acd92aa87860a960b2d2d4a91552613f2a83
SHA51207b7311180401aa74a5d5208007b0ed66c8767fd399e35a59c3f77ff2043f47987c4e4006697085395c779b2a0d3aa3fdae7ae58e9144ea7a835483ee399d7cd
-
Filesize
72KB
MD536d24132150e820598e182d2f51b35b6
SHA1a1773014c2f0ac1dafc87f3e8d6cd2f697417eae
SHA256e8ba9a4744b38798138c8360fa0c892169f128658ae80e9cf229e34c2a683a71
SHA512f6da08a584e74bdc2f9f7ea611fc49cfacc8bea3e301c86b53d8c0354028e245b6d9f0149a98207023fcbb9b5561f177e6835e16dfbb2f3d6a343569c0440350