Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 20:46

General

  • Target

    JaffaCakes118_aba9ea59aab84849cf371965c19ef46c.exe

  • Size

    88KB

  • MD5

    aba9ea59aab84849cf371965c19ef46c

  • SHA1

    366050aca450a5d1ea67ea5b6b1902a60c721c01

  • SHA256

    99988371c15bd38fc947d898dc6eeb0d425c98f7bd471d040c24c8c667bd2b0b

  • SHA512

    f38d27e4a58492a59043cf8ee3df3eb317581f3fb98b59d6d1b32163acc83a403425a554e1974e60c857b3489cf1d49a0e6de8734a9a159fea4d6fe571302248

  • SSDEEP

    1536:/pYuMcLBTyURwzDZHj91tYLNAnb08np3QTxrG3x:/pYeuURwzRjnoAnb0ypQmx

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aba9ea59aab84849cf371965c19ef46c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aba9ea59aab84849cf371965c19ef46c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3060-0-0x000000007483E000-0x000000007483F000-memory.dmp

    Filesize

    4KB

  • memory/3060-1-0x0000000000C10000-0x0000000000C2C000-memory.dmp

    Filesize

    112KB

  • memory/3060-2-0x000000007483E000-0x000000007483F000-memory.dmp

    Filesize

    4KB

  • memory/3060-3-0x0000000074830000-0x0000000074F1E000-memory.dmp

    Filesize

    6.9MB

  • memory/3060-4-0x0000000074830000-0x0000000074F1E000-memory.dmp

    Filesize

    6.9MB