Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 02:14

General

  • Target

    15ff5326b957a8b747b95c47d6a65741_JaffaCakes118.exe

  • Size

    908KB

  • MD5

    15ff5326b957a8b747b95c47d6a65741

  • SHA1

    0d9c5be1f1c3c71e4a7971743624932f834a3499

  • SHA256

    3db9de8b202f6b0643516cf6f89e1c70acc7b2f17d8341fd830e96843cbcc44e

  • SHA512

    ebe3f5a5294c82c0b92ba55770902b932ca2d708879d3a15f8940fe5602ca95434bfb1282cc93d7966ed23e1a28f1402ae3203cf0e12537820651a55d8717a59

  • SSDEEP

    12288:QqjqRBa80gi+TCUQpd6KA26mY6nltHnhm9FXRN:QwqN0gi+TCUQvHEFXf

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ff5326b957a8b747b95c47d6a65741_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\15ff5326b957a8b747b95c47d6a65741_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Users\Admin\AppData\Roaming\model\print.exe
      "C:\Users\Admin\AppData\Roaming\model\print.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3940
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\model\print.exe

      Filesize

      908KB

      MD5

      f49ac96a176748516b30b38078e8e153

      SHA1

      cc86efb8b803fadc487574143e7776d7ff7fed0d

      SHA256

      55f96a3fd173fbf5b7047d3b7bf9f46e5b58266bd9ed9ecb5434e3683df623f4

      SHA512

      9783f568dad8c0ab27c0eef3ac2109e77272607698e5ce9cb90e1f6dfee3199cdb25d3a52f5d790008314bf94209b8821490725567915d0f1addace92d04740c

    • memory/1528-0-0x00000000007C0000-0x000000000089E000-memory.dmp

      Filesize

      888KB

    • memory/1528-1-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/1528-2-0x00000000058B0000-0x0000000005E54000-memory.dmp

      Filesize

      5.6MB

    • memory/1528-3-0x0000000005250000-0x00000000052E2000-memory.dmp

      Filesize

      584KB

    • memory/1528-4-0x00000000054E0000-0x00000000054F0000-memory.dmp

      Filesize

      64KB

    • memory/1528-5-0x0000000005240000-0x000000000524A000-memory.dmp

      Filesize

      40KB

    • memory/1528-6-0x0000000005230000-0x0000000005238000-memory.dmp

      Filesize

      32KB

    • memory/1528-7-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/1528-8-0x00000000054E0000-0x00000000054F0000-memory.dmp

      Filesize

      64KB

    • memory/1528-22-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2284-26-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/2284-30-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2284-25-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2284-23-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/2284-27-0x0000000005590000-0x00000000055E8000-memory.dmp

      Filesize

      352KB

    • memory/2284-24-0x0000000005030000-0x0000000005040000-memory.dmp

      Filesize

      64KB

    • memory/3940-33-0x0000000004E30000-0x0000000004E40000-memory.dmp

      Filesize

      64KB

    • memory/3940-31-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/3940-32-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/3940-28-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/3940-34-0x0000000004FA0000-0x000000000504E000-memory.dmp

      Filesize

      696KB

    • memory/3940-35-0x00000000083D0000-0x00000000083F8000-memory.dmp

      Filesize

      160KB

    • memory/3940-36-0x0000000006460000-0x00000000064FC000-memory.dmp

      Filesize

      624KB

    • memory/3940-37-0x0000000006A30000-0x0000000006A96000-memory.dmp

      Filesize

      408KB

    • memory/3940-38-0x0000000007160000-0x0000000007178000-memory.dmp

      Filesize

      96KB

    • memory/3940-39-0x0000000007740000-0x0000000007756000-memory.dmp

      Filesize

      88KB

    • memory/3940-45-0x00000000750F0000-0x00000000758A0000-memory.dmp

      Filesize

      7.7MB

    • memory/3940-46-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB