Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2024 04:22

General

  • Target

    4cfcd39b235b56ba3d3f4c0523a3be9a_JaffaCakes118.exe

  • Size

    908KB

  • MD5

    4cfcd39b235b56ba3d3f4c0523a3be9a

  • SHA1

    32f868c28e9679d3decc61bded84db0123f7aa50

  • SHA256

    5af8691a699f563dbcdbe953134a7a13da79abcadaf06d1e2f12aa184260029e

  • SHA512

    d76c2d397a662bbb7e5cfeed00268a3be665d9ddb526f70e048d6956e942a179cb4791cf0676c8ce583c2101bad7e4381ab2b83ce4943a6754846cf3e47f43ab

  • SSDEEP

    12288:QqjqRBa80gi+TCUQpd6KA26mY6nltHnhm9FXRD:QwqN0gi+TCUQvHEFX9

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cfcd39b235b56ba3d3f4c0523a3be9a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4cfcd39b235b56ba3d3f4c0523a3be9a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Users\Admin\AppData\Roaming\model\print.exe
      "C:\Users\Admin\AppData\Roaming\model\print.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:4316
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:4140
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1304
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:1884

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\model\print.exe

          Filesize

          908KB

          MD5

          10bcaca07652d8715585f063259b2479

          SHA1

          96ce7e40d9a15dc818f739cfb05c865db5a684db

          SHA256

          2e1da8c735d2da8a4ca42b8bebef8d66732778e7f2f9ccc1cafec47d6b9863c4

          SHA512

          8f503955eea4638dec8441269b62fea5770c34efbc9c5911ad47196726ada6bd51c2b5bf335aab8434b58d03d639a6af2d124f98e10895c4958fc82add55c603

        • memory/1000-30-0x0000000075320000-0x0000000075AD0000-memory.dmp

          Filesize

          7.7MB

        • memory/1000-27-0x0000000005890000-0x00000000058E8000-memory.dmp

          Filesize

          352KB

        • memory/1000-26-0x00000000055A0000-0x00000000055B0000-memory.dmp

          Filesize

          64KB

        • memory/1000-25-0x0000000075320000-0x0000000075AD0000-memory.dmp

          Filesize

          7.7MB

        • memory/1000-24-0x00000000055A0000-0x00000000055B0000-memory.dmp

          Filesize

          64KB

        • memory/1000-23-0x0000000075320000-0x0000000075AD0000-memory.dmp

          Filesize

          7.7MB

        • memory/1304-34-0x0000000004F30000-0x0000000004FDE000-memory.dmp

          Filesize

          696KB

        • memory/1304-36-0x00000000064E0000-0x000000000657C000-memory.dmp

          Filesize

          624KB

        • memory/1304-46-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/1304-45-0x0000000075320000-0x0000000075AD0000-memory.dmp

          Filesize

          7.7MB

        • memory/1304-39-0x00000000077B0000-0x00000000077C6000-memory.dmp

          Filesize

          88KB

        • memory/1304-38-0x0000000007200000-0x0000000007218000-memory.dmp

          Filesize

          96KB

        • memory/1304-37-0x0000000007150000-0x00000000071B6000-memory.dmp

          Filesize

          408KB

        • memory/1304-35-0x0000000002700000-0x0000000002728000-memory.dmp

          Filesize

          160KB

        • memory/1304-32-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/1304-28-0x0000000000400000-0x0000000000456000-memory.dmp

          Filesize

          344KB

        • memory/1304-33-0x0000000000D80000-0x0000000000D90000-memory.dmp

          Filesize

          64KB

        • memory/1304-31-0x0000000075320000-0x0000000075AD0000-memory.dmp

          Filesize

          7.7MB

        • memory/3772-1-0x0000000075320000-0x0000000075AD0000-memory.dmp

          Filesize

          7.7MB

        • memory/3772-2-0x0000000005B60000-0x0000000006104000-memory.dmp

          Filesize

          5.6MB

        • memory/3772-0-0x0000000000D70000-0x0000000000E4E000-memory.dmp

          Filesize

          888KB

        • memory/3772-3-0x00000000056A0000-0x0000000005732000-memory.dmp

          Filesize

          584KB

        • memory/3772-8-0x00000000057C0000-0x00000000057D0000-memory.dmp

          Filesize

          64KB

        • memory/3772-4-0x00000000057C0000-0x00000000057D0000-memory.dmp

          Filesize

          64KB

        • memory/3772-5-0x0000000005770000-0x000000000577A000-memory.dmp

          Filesize

          40KB

        • memory/3772-6-0x0000000005760000-0x0000000005768000-memory.dmp

          Filesize

          32KB

        • memory/3772-22-0x0000000075320000-0x0000000075AD0000-memory.dmp

          Filesize

          7.7MB

        • memory/3772-7-0x0000000075320000-0x0000000075AD0000-memory.dmp

          Filesize

          7.7MB