Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 18:39

General

  • Target

    JaffaCakes118_b72f01503f93119443cc9cb1a96561a0.exe

  • Size

    2.3MB

  • MD5

    b72f01503f93119443cc9cb1a96561a0

  • SHA1

    27e60439abacc18c1cca680fbf54b3d0e945a18a

  • SHA256

    05cd69760b7358e9f1d06a077bcac5776e788e6d3c2af917f1aa8bebe16d8b7a

  • SHA512

    8e0bf201f59a5a5b8ac019060100327db1e1daa64d256c41b6dc87abe5f6a1b2679ac3bd87e6c6fd95af0e50e315b0055fe537f1ad66346dce6652ba4e0014b0

  • SSDEEP

    49152:izCjo6k0aWbdhmvwoy+cAd314kpT3Kf8BfiUy6NN5gc:Po/AdhKwoyNI31v3FBfinmN5gc

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b72f01503f93119443cc9cb1a96561a0.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b72f01503f93119443cc9cb1a96561a0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2184-0-0x0000000000A20000-0x0000000001044000-memory.dmp

    Filesize

    6.1MB

  • memory/2184-1-0x0000000074FD0000-0x0000000074FD1000-memory.dmp

    Filesize

    4KB

  • memory/2184-3-0x0000000074FB0000-0x00000000750A0000-memory.dmp

    Filesize

    960KB

  • memory/2184-2-0x0000000074FB0000-0x00000000750A0000-memory.dmp

    Filesize

    960KB

  • memory/2184-6-0x0000000000A20000-0x0000000001044000-memory.dmp

    Filesize

    6.1MB

  • memory/2184-7-0x0000000000A20000-0x0000000001044000-memory.dmp

    Filesize

    6.1MB

  • memory/2184-8-0x0000000005F00000-0x00000000064A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2184-9-0x0000000006AD0000-0x00000000070E8000-memory.dmp

    Filesize

    6.1MB

  • memory/2184-10-0x0000000005AC0000-0x0000000005B52000-memory.dmp

    Filesize

    584KB

  • memory/2184-11-0x0000000005A80000-0x0000000005A92000-memory.dmp

    Filesize

    72KB

  • memory/2184-12-0x0000000005C70000-0x0000000005D7A000-memory.dmp

    Filesize

    1.0MB

  • memory/2184-13-0x0000000005C20000-0x0000000005C5C000-memory.dmp

    Filesize

    240KB

  • memory/2184-14-0x00000000065E0000-0x000000000662C000-memory.dmp

    Filesize

    304KB

  • memory/2184-15-0x0000000000A20000-0x0000000001044000-memory.dmp

    Filesize

    6.1MB

  • memory/2184-16-0x0000000074FD0000-0x0000000074FD1000-memory.dmp

    Filesize

    4KB

  • memory/2184-17-0x0000000074FB0000-0x00000000750A0000-memory.dmp

    Filesize

    960KB

  • memory/2184-19-0x0000000074FB0000-0x00000000750A0000-memory.dmp

    Filesize

    960KB