Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 12:39

General

  • Target

    JaffaCakes118_9fbb77e163710c588a557e3dfd67ff10.exe

  • Size

    3.0MB

  • MD5

    9fbb77e163710c588a557e3dfd67ff10

  • SHA1

    99c877c6543121623ba72d61e040258fe6168389

  • SHA256

    f4b85a735a9facd0637d522ff0bb3900fbf973fc8ca07c88463cd78760cbff14

  • SHA512

    c5578a905907a827cbd9f4dba35913a1f6a920f3033cbc2d4446d0028ca43dd99b8431833ec79cb08495b1bc18198cf864a087a94293bbc40bbc48f4f60fb679

  • SSDEEP

    49152:YJXZRkXRxWCBu72E76E5jXVL5w9lmVOALga7n0Y8:K8

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

194.33.45.3:4898

Attributes
  • communication_password

    89ec00ac3524ab4f7edd70785d23e302

  • tor_process

    tor

Signatures

  • BitRAT

    BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

  • Bitrat family
  • Detected Nirsoft tools 1 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Access Token Manipulation: Create Process with Token 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9fbb77e163710c588a557e3dfd67ff10.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9fbb77e163710c588a557e3dfd67ff10.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2916
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2932
    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Access Token Manipulation: Create Process with Token
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4820
      • C:\Windows\System32\sc.exe
        "C:\Windows\System32\sc.exe" stop WinDefend
        3⤵
        • Launches sc.exe
        PID:3120
    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Access Token Manipulation: Create Process with Token
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4460
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2300
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9fbb77e163710c588a557e3dfd67ff10.exe" -Force
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:712
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9fbb77e163710c588a557e3dfd67ff10.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9fbb77e163710c588a557e3dfd67ff10.exe
      2⤵
        PID:840
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9fbb77e163710c588a557e3dfd67ff10.exe
        C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9fbb77e163710c588a557e3dfd67ff10.exe
        2⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      1KB

      MD5

      6195a91754effb4df74dbc72cdf4f7a6

      SHA1

      aba262f5726c6d77659fe0d3195e36a85046b427

      SHA256

      3254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5

      SHA512

      ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      20091a8241c237e861b62ac93ac7e4db

      SHA1

      d5bcfe79038a4dcf89026110df46f4d1e027f3fe

      SHA256

      3e94ad89f331fe64e636aef66272e086db504c2cb64c1226e368fe50821e906e

      SHA512

      02368ac2b2232be20ff287bf495513e26e6ea49bb730528b12211a8c945616ce99e87c2df903fdd861b21f92c375dc014e80c1777a0f32936e289a8d52524676

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      c6b87e01cf05b820f04b422e80bd5cda

      SHA1

      1815738d761f7cd9c3b2a22e95e81703bfe32104

      SHA256

      b7592781c99313a787f567fd79593cd52281d5714f41f02b5496403c2dce9b98

      SHA512

      d764e1e64352ef0a20b337e473dc649176eabc4a09a33851eb59dc9ef2d65155a850ad1c4c45f5d71d7cf5189dba0f495e1e9676b8f75fff3159f640a3224168

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      16KB

      MD5

      46dc56dbf8ecc4e5795591891b051b78

      SHA1

      0fc1135d2fdce6965bc6538749172432b311981e

      SHA256

      c770c3fd8342db66618c4144497fd72a53331f53770700700ee9a30b2144293c

      SHA512

      5be7fd65626121899bd76904a2606dbb45ab375fbab1a82b4d248c4f4697c41bfb9a0eb11c92f69d13b5dbbefd8f52b78b03a8f11946dec1c13d2bbcee7ddc64

    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe

      Filesize

      88KB

      MD5

      17fc12902f4769af3a9271eb4e2dacce

      SHA1

      9a4a1581cc3971579574f837e110f3bd6d529dab

      SHA256

      29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

      SHA512

      036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_aq01mnlv.kkz.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/712-96-0x0000000006980000-0x00000000069CC000-memory.dmp

      Filesize

      304KB

    • memory/712-108-0x00000000078A0000-0x00000000078C2000-memory.dmp

      Filesize

      136KB

    • memory/712-107-0x0000000007940000-0x00000000079D6000-memory.dmp

      Filesize

      600KB

    • memory/712-84-0x0000000006290000-0x00000000065E4000-memory.dmp

      Filesize

      3.3MB

    • memory/1940-31-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/1940-46-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/1940-39-0x0000000005F30000-0x0000000006284000-memory.dmp

      Filesize

      3.3MB

    • memory/1940-32-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/1940-33-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/2300-65-0x000002A724CB0000-0x000002A724CD2000-memory.dmp

      Filesize

      136KB

    • memory/2916-29-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/2916-19-0x0000000006450000-0x00000000067A4000-memory.dmp

      Filesize

      3.3MB

    • memory/2916-26-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/2916-6-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/2916-5-0x0000000005AF0000-0x0000000006118000-memory.dmp

      Filesize

      6.2MB

    • memory/2916-12-0x0000000006120000-0x0000000006142000-memory.dmp

      Filesize

      136KB

    • memory/2916-23-0x0000000006D50000-0x0000000006D6A000-memory.dmp

      Filesize

      104KB

    • memory/2916-22-0x00000000080B0000-0x000000000872A000-memory.dmp

      Filesize

      6.5MB

    • memory/2916-21-0x0000000006870000-0x00000000068BC000-memory.dmp

      Filesize

      304KB

    • memory/2916-4-0x0000000002F30000-0x0000000002F66000-memory.dmp

      Filesize

      216KB

    • memory/2916-20-0x0000000006850000-0x000000000686E000-memory.dmp

      Filesize

      120KB

    • memory/2916-3-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/2916-17-0x00000000062C0000-0x0000000006326000-memory.dmp

      Filesize

      408KB

    • memory/2916-18-0x0000000006330000-0x0000000006396000-memory.dmp

      Filesize

      408KB

    • memory/3440-82-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-112-0x0000000075630000-0x0000000075669000-memory.dmp

      Filesize

      228KB

    • memory/3440-117-0x0000000071D30000-0x0000000071D69000-memory.dmp

      Filesize

      228KB

    • memory/3440-116-0x0000000071DF0000-0x0000000071E29000-memory.dmp

      Filesize

      228KB

    • memory/3440-81-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-115-0x0000000075630000-0x0000000075669000-memory.dmp

      Filesize

      228KB

    • memory/3440-114-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-113-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-111-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-110-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-97-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-98-0x0000000071DF0000-0x0000000071E29000-memory.dmp

      Filesize

      228KB

    • memory/3440-99-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-105-0x0000000000400000-0x00000000007CE000-memory.dmp

      Filesize

      3.8MB

    • memory/3440-106-0x0000000071D30000-0x0000000071D69000-memory.dmp

      Filesize

      228KB

    • memory/3484-58-0x00000000063E0000-0x00000000065D6000-memory.dmp

      Filesize

      2.0MB

    • memory/3484-24-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

      Filesize

      4KB

    • memory/3484-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

      Filesize

      4KB

    • memory/3484-1-0x0000000000DD0000-0x00000000010C6000-memory.dmp

      Filesize

      3.0MB

    • memory/3484-2-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-59-0x00000000075E0000-0x00000000077BA000-memory.dmp

      Filesize

      1.9MB

    • memory/3484-85-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-25-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/3484-77-0x0000000007E10000-0x00000000083B4000-memory.dmp

      Filesize

      5.6MB

    • memory/3484-76-0x00000000077C0000-0x0000000007852000-memory.dmp

      Filesize

      584KB