Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 11:22
Behavioral task
behavioral1
Sample
JaffaCakes118_a0a38a2d92e516306c9b0ff455ec5a70.ps1
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_a0a38a2d92e516306c9b0ff455ec5a70.ps1
-
Size
401KB
-
MD5
a0a38a2d92e516306c9b0ff455ec5a70
-
SHA1
e9852c1f451a27edc74f399148869dc436fad878
-
SHA256
c6cced9b9ff8c73cf120a7422dda5cf760cfadffc40ad1cc0c957825843db10c
-
SHA512
dc9763b4db14465851484956bcc965c745b7eb6895d53acae12ba1b2263e5c4638f724dcac485353dd1d9c95a9e55162917612211db52f22ea7f4da3a091400f
-
SSDEEP
1536:5wG7MA34KtGjNnRm9aTpYlIgayfLyhmyORtjIPxplXCZInfLwbkSOW+69VoBwIsw:5k
Malware Config
Extracted
asyncrat
0.5.7B
Hacked
toornavigator.sytes.net:5500
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
notepad.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 2684 2644 powershell.exe 31 -
pid Process 2644 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2644 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31 PID 2644 wrote to memory of 2684 2644 powershell.exe 31
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0a38a2d92e516306c9b0ff455ec5a70.ps11⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2684
-