Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 17:43

General

  • Target

    35c82cd9f2b90bf84a83dfddd0da32fd_JaffaCakes118.exe

  • Size

    598KB

  • MD5

    35c82cd9f2b90bf84a83dfddd0da32fd

  • SHA1

    97cf182a5b40a5fcf320ee92adee47eabc9c41a9

  • SHA256

    bf390af80de742815f82101b0694d401810c2c7fa165afbbcaba73f70439db8e

  • SHA512

    7805249c5b7ee474c9cbc2d684ebc220d939d210d095414117e55db416dc56c30f59ddba139290a92fbea91c98e3ce8289e262fe670a558725777fdfadd37a16

  • SSDEEP

    12288:Pds3bdz0BKRBqb5y8wBQFZyQM19vkWiwcscqYoeIv91Cq2yBkczFfv:Vs3Jzb8grBQVts9D

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4404
    • C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1236
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_JaffaCakes118.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4672
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:2768
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:4392

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118.exe.log

      Filesize

      518B

      MD5

      6f7d75899d5427a4ada7a840a7a04d5c

      SHA1

      99eb2c39ba43c7e65dc798fe8b52c53de03816ea

      SHA256

      a027cb814313e8be32f1be8b9d39bb0ba03263c6fde02e6b8ee69e5b925db67e

      SHA512

      4ed2f02a9966ef1511399770fbfa2a06700fe184d365284d9031041bb641cf55717797c6935e8d192620961e49cca8ad24a96cc0af883ee9b7733940f5356a24

    • C:\Users\Admin\AppData\Local\Temp\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118\35c82cd9f2b90bf84a83dfddd0da32fd_jaffacakes118.exe

      Filesize

      598KB

      MD5

      35c82cd9f2b90bf84a83dfddd0da32fd

      SHA1

      97cf182a5b40a5fcf320ee92adee47eabc9c41a9

      SHA256

      bf390af80de742815f82101b0694d401810c2c7fa165afbbcaba73f70439db8e

      SHA512

      7805249c5b7ee474c9cbc2d684ebc220d939d210d095414117e55db416dc56c30f59ddba139290a92fbea91c98e3ce8289e262fe670a558725777fdfadd37a16

    • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

      Filesize

      36B

      MD5

      51697ffee1aed82968498556e0405f14

      SHA1

      1eafad9fa688a23ec8a06e3c46d0330d10c6ed63

      SHA256

      bbc918e57061124449612cf763babcea913ee8e90d9275b3cfb35c70c25a8210

      SHA512

      6659f6ded8d4037666d44af349eb999418c9f8a1d13bc5bc20ec146fbf6db92cac737a9cd3c6664b1a331e74794bea0f82b77e132ad59725bed13ba16b40700d

    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

      Filesize

      478B

      MD5

      59ed8a31babeb14af0463f5ac5194f45

      SHA1

      b31ec1a71a4eb37fb7d084abccadc75c9ffe0783

      SHA256

      05ea07de0af19463dd8ad1d4c6b90626b0dcbef84745f75b0dda320eb4210175

      SHA512

      4f682863d406b46a150b0c0e168279438450d2f0e38c79d7c0b4dea5aa185258c418eafbc8eccb82323eaa1ed6ef663f9e8e480cb03acf71af023ede12cdbfd3

    • memory/1584-17-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/1584-35-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/1584-6-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/1584-7-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/1584-4-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/4404-13-0x00000000007F0000-0x00000000007F5000-memory.dmp

      Filesize

      20KB

    • memory/4404-16-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/4404-14-0x00000000007F0000-0x00000000007F5000-memory.dmp

      Filesize

      20KB

    • memory/4404-0-0x0000000074A32000-0x0000000074A33000-memory.dmp

      Filesize

      4KB

    • memory/4404-15-0x00000000007F0000-0x00000000007F5000-memory.dmp

      Filesize

      20KB

    • memory/4404-3-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/4404-5-0x0000000074A32000-0x0000000074A33000-memory.dmp

      Filesize

      4KB

    • memory/4404-2-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/4404-1-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/5048-32-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/5048-34-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/5048-41-0x0000000005E60000-0x0000000005E61000-memory.dmp

      Filesize

      4KB

    • memory/5048-40-0x0000000005E50000-0x0000000005E55000-memory.dmp

      Filesize

      20KB

    • memory/5048-39-0x0000000005E50000-0x0000000005E55000-memory.dmp

      Filesize

      20KB

    • memory/5048-38-0x0000000005E50000-0x0000000005E55000-memory.dmp

      Filesize

      20KB

    • memory/5048-51-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB

    • memory/5048-33-0x0000000074A30000-0x0000000074FE1000-memory.dmp

      Filesize

      5.7MB