Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 02:25

General

  • Target

    158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe

  • Size

    784KB

  • MD5

    158f6d23703e5052c808b162adb7df4b

  • SHA1

    16789f0fceaf1d8e36d2b4d310b819ccfa5bc52f

  • SHA256

    87a7a6196c52b88f490000ba9e4c65496f73738d1e31c1e5c87038ec4e958c83

  • SHA512

    2d758c5bb38f52837a284f7f75e0c9a5479eb627502fdc3fda7bfdf555e889253697a2251375ef91400a99b295ed3cb4511b2feee00d015e39c8e9e8e8d0e07c

  • SSDEEP

    12288:P+Yu4qDKQHY9o5OmG1Zhw0JcRgvKOIyG:PvqDHHYkOl+RRIKdv

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1724
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_JaffaCakes118.exe"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:2820
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat
      Filesize

      53B

      MD5

      5d660ca6c69d442fdd1a2a0167cfc608

      SHA1

      5ad668807ee6f01dc2176029c7b2e6187a9b659e

      SHA256

      4efd7a6fcb8fcecd08e19f8693c182c1742d7ef268d3a4800e2a83b05aef8bf5

      SHA512

      8abafe1e172d3341121c732493e1b67348805cf635b1157de81f5075a2123318fc2eaa1fdcb99efbf7231c3b39ec8afadd0525a1f6e321104adf5721e66c6c08

    • \Users\Admin\AppData\Local\Temp\158f6d23703e5052c808b162adb7df4b_jaffacakes118\158f6d23703e5052c808b162adb7df4b_jaffacakes118.exe
      Filesize

      784KB

      MD5

      158f6d23703e5052c808b162adb7df4b

      SHA1

      16789f0fceaf1d8e36d2b4d310b819ccfa5bc52f

      SHA256

      87a7a6196c52b88f490000ba9e4c65496f73738d1e31c1e5c87038ec4e958c83

      SHA512

      2d758c5bb38f52837a284f7f75e0c9a5479eb627502fdc3fda7bfdf555e889253697a2251375ef91400a99b295ed3cb4511b2feee00d015e39c8e9e8e8d0e07c

    • memory/1652-4-0x000000007429E000-0x000000007429F000-memory.dmp
      Filesize

      4KB

    • memory/1652-2-0x0000000000300000-0x0000000000320000-memory.dmp
      Filesize

      128KB

    • memory/1652-5-0x0000000074290000-0x000000007497E000-memory.dmp
      Filesize

      6.9MB

    • memory/1652-0-0x000000007429E000-0x000000007429F000-memory.dmp
      Filesize

      4KB

    • memory/1652-1-0x0000000001380000-0x000000000144C000-memory.dmp
      Filesize

      816KB

    • memory/1652-3-0x0000000074290000-0x000000007497E000-memory.dmp
      Filesize

      6.9MB

    • memory/1652-11-0x0000000074290000-0x000000007497E000-memory.dmp
      Filesize

      6.9MB

    • memory/1656-24-0x00000000000E0000-0x00000000001AC000-memory.dmp
      Filesize

      816KB

    • memory/1724-39-0x00000000007A0000-0x00000000007B6000-memory.dmp
      Filesize

      88KB

    • memory/1724-33-0x00000000001B0000-0x0000000000206000-memory.dmp
      Filesize

      344KB

    • memory/1724-36-0x00000000001B0000-0x0000000000206000-memory.dmp
      Filesize

      344KB

    • memory/1724-29-0x00000000001B0000-0x0000000000206000-memory.dmp
      Filesize

      344KB

    • memory/2576-10-0x0000000000400000-0x0000000000456000-memory.dmp
      Filesize

      344KB

    • memory/2576-15-0x0000000004E50000-0x0000000004EFE000-memory.dmp
      Filesize

      696KB

    • memory/2576-16-0x00000000003C0000-0x00000000003E8000-memory.dmp
      Filesize

      160KB

    • memory/2576-25-0x0000000074290000-0x000000007497E000-memory.dmp
      Filesize

      6.9MB

    • memory/2576-14-0x0000000074290000-0x000000007497E000-memory.dmp
      Filesize

      6.9MB

    • memory/2576-13-0x0000000000230000-0x0000000000240000-memory.dmp
      Filesize

      64KB

    • memory/2576-12-0x0000000074290000-0x000000007497E000-memory.dmp
      Filesize

      6.9MB

    • memory/2576-9-0x0000000000400000-0x0000000000456000-memory.dmp
      Filesize

      344KB

    • memory/2576-6-0x0000000000400000-0x0000000000456000-memory.dmp
      Filesize

      344KB