Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 20:03
Behavioral task
behavioral1
Sample
JaffaCakes118_33ba1039fcc9ba9fe3c144b9d82d0229.exe
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
General
-
Target
JaffaCakes118_33ba1039fcc9ba9fe3c144b9d82d0229.exe
-
Size
159KB
-
MD5
33ba1039fcc9ba9fe3c144b9d82d0229
-
SHA1
4bc67c6d561bb0ad8de6bcbcec8389844b464d2d
-
SHA256
72964cbf800fe900c7e6b8f8573a49ba4da2e620e2553a27d2058024809221f3
-
SHA512
4096757a61adcd3e890100a63d75d1d8922f5bca4b01c77042e3f582e70344c86be760f254f5788554ad30bcd6030386b779679766b3586a3bb4a2bda33cd92c
-
SSDEEP
3072:V7bEzvNTDbteZreQmUxl1dOrLC/Galj2falXND0o/z:9ylTDb0w2xrdOrLC/Galj2falXx0g
Malware Config
Extracted
Family
asyncrat
Version
3.0.0.2
Botnet
Default
C2
888ratsetup-50727.portmap.host:50727
Attributes
-
delay
1
-
install
false
-
install_file
Ngrok
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4456 JaffaCakes118_33ba1039fcc9ba9fe3c144b9d82d0229.exe Token: SeDebugPrivilege 4456 JaffaCakes118_33ba1039fcc9ba9fe3c144b9d82d0229.exe