Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 09:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe
-
Size
71KB
-
MD5
fcf393b445d4f0b001d53e097db8e5fe
-
SHA1
8c46fdbab506cd8aa5cdec4a6347e9c655c387e3
-
SHA256
6d42ab03dc8bf128ef84fd8c6a33b113ac9961077f72ab94a353a5e4f05aac61
-
SHA512
d30371c10b63ce8a9649de204e19769f22b0e9c1a15938418556e79c4df2d80e72322f24afcfe5c0f2a6b02663c174c76f0e0c6c4bd923c1cf1f5b1e3fb4eacb
-
SSDEEP
1536:H9WXJ4FGFYQRVU6EkaS3Ystx7Adpf7PS5TSVHbFqZKdMF/gTwHMBy:UAw26Eka1sLeZ7PS5TSdFqZFoE
Malware Config
Extracted
asyncrat
0.5.7B
Default
remalarm.ddns.net:6606
remalarm.ddns.net:8808
AsyncMutex_6SI8OkPnk
-
delay
10
-
install
true
-
install_file
Test.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1368-6-0x0000000004ED0000-0x0000000004EE2000-memory.dmp family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 Test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Test.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2376 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe Token: SeDebugPrivilege 3000 Test.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1780 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 89 PID 1368 wrote to memory of 1780 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 89 PID 1368 wrote to memory of 1780 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 89 PID 1368 wrote to memory of 768 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 91 PID 1368 wrote to memory of 768 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 91 PID 1368 wrote to memory of 768 1368 JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe 91 PID 1780 wrote to memory of 4324 1780 cmd.exe 93 PID 1780 wrote to memory of 4324 1780 cmd.exe 93 PID 1780 wrote to memory of 4324 1780 cmd.exe 93 PID 768 wrote to memory of 2376 768 cmd.exe 94 PID 768 wrote to memory of 2376 768 cmd.exe 94 PID 768 wrote to memory of 2376 768 cmd.exe 94 PID 768 wrote to memory of 3000 768 cmd.exe 97 PID 768 wrote to memory of 3000 768 cmd.exe 97 PID 768 wrote to memory of 3000 768 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fcf393b445d4f0b001d53e097db8e5fe.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Test" /tr '"C:\Users\Admin\AppData\Roaming\Test.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Test" /tr '"C:\Users\Admin\AppData\Roaming\Test.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD2D1.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2376
-
-
C:\Users\Admin\AppData\Roaming\Test.exe"C:\Users\Admin\AppData\Roaming\Test.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD592d2fea1bcae2ca59c7e1e853db15351
SHA112fd56e674b09a184f7a07cc2696538c4ef026b9
SHA256d42b882964ec5890dca4ad856c26ca1ff1e814931f3e14b8cd37ec67e168bce5
SHA51285125c0b08b8e712e46388915bc98ab8268151cd64447af05961f9ae31ee01dcbe7061d73ff09a274973086384ce145455eb53ef9834f296467633bed614c8b5
-
Filesize
71KB
MD5fcf393b445d4f0b001d53e097db8e5fe
SHA18c46fdbab506cd8aa5cdec4a6347e9c655c387e3
SHA2566d42ab03dc8bf128ef84fd8c6a33b113ac9961077f72ab94a353a5e4f05aac61
SHA512d30371c10b63ce8a9649de204e19769f22b0e9c1a15938418556e79c4df2d80e72322f24afcfe5c0f2a6b02663c174c76f0e0c6c4bd923c1cf1f5b1e3fb4eacb