Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 14:28

General

  • Target

    3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe

  • Size

    664KB

  • MD5

    3a953da50bb2efad589b0f37442ea696

  • SHA1

    1d3818f6e7682b59116aa99483a42e1589c1cd92

  • SHA256

    bbcc1239e936c0fab9f67dbd6013fe301eaae1833d153ecdb2824ea6274014ea

  • SHA512

    381be4093996457274b9cf23badfc452a777dd80cf050c83d979dc9cd2cea9b5b55573552d4d1992124e0740c81c97ee76f5c0e5665731a8a4afd858b8c31360

  • SSDEEP

    12288:n1JOe82836fgbmBUX+jC+uZ9Vq6P1SdVFdbaJUCHDuINrHmkp0cfT:OlPqfgbmeaC+uR5EVFdbaJUC68q9

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1924
          • C:\Windows\SysWOW64\taskmgr.exe
            "C:\Windows\System32\taskmgr.exe"
            5⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2268
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:2188
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:2684
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:3004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

      Filesize

      53B

      MD5

      0b14567e25c17a8e4db00de35298b662

      SHA1

      3a12f997aea17ba8e3a26cc402e1001f7b4ca653

      SHA256

      a1c123735b78114f897de568439c91685a8013c29a0b22b135cdfbf3f2a34297

      SHA512

      49a4889fea5ce994a80ae8d6617833ee036eae708226e279124af67e025ddcd3033c54184c8721337c94cb477d640a6dd1d768c78c28e9839b5f08ab11680912

    • \Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe

      Filesize

      664KB

      MD5

      3a953da50bb2efad589b0f37442ea696

      SHA1

      1d3818f6e7682b59116aa99483a42e1589c1cd92

      SHA256

      bbcc1239e936c0fab9f67dbd6013fe301eaae1833d153ecdb2824ea6274014ea

      SHA512

      381be4093996457274b9cf23badfc452a777dd80cf050c83d979dc9cd2cea9b5b55573552d4d1992124e0740c81c97ee76f5c0e5665731a8a4afd858b8c31360

    • memory/2304-14-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2304-0-0x00000000744D1000-0x00000000744D2000-memory.dmp

      Filesize

      4KB

    • memory/2304-3-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2304-5-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2304-4-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2304-1-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2304-2-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2680-6-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/2680-13-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2680-12-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2680-11-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2680-10-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/2680-22-0x00000000744D0000-0x0000000074A7B000-memory.dmp

      Filesize

      5.7MB

    • memory/2680-8-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB