Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 14:28

General

  • Target

    3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe

  • Size

    664KB

  • MD5

    3a953da50bb2efad589b0f37442ea696

  • SHA1

    1d3818f6e7682b59116aa99483a42e1589c1cd92

  • SHA256

    bbcc1239e936c0fab9f67dbd6013fe301eaae1833d153ecdb2824ea6274014ea

  • SHA512

    381be4093996457274b9cf23badfc452a777dd80cf050c83d979dc9cd2cea9b5b55573552d4d1992124e0740c81c97ee76f5c0e5665731a8a4afd858b8c31360

  • SSDEEP

    12288:n1JOe82836fgbmBUX+jC+uZ9Vq6P1SdVFdbaJUCHDuINrHmkp0cfT:OlPqfgbmeaC+uR5EVFdbaJUC68q9

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3748
      • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3192
          • C:\Windows\SysWOW64\Taskmgr.exe
            "C:\Windows\System32\Taskmgr.exe"
            5⤵
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3688
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_JaffaCakes118.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:4324
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:4760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe.log

      Filesize

      518B

      MD5

      ad004b26c85a2fea2501c42e59ef51cc

      SHA1

      867e15b6ae4565e283f27d0e42934ded5b05e885

      SHA256

      20574d8ac18345c7e7268dde4d58faf15f4608b472ed8170f300e76699cbc076

      SHA512

      35affec7e06155ea5e7d02adf8b256ca4d528ea012030f87738ffc12c45bd81703484bd2b86fc52e8029bae42db9cdbe75cd831decfa47622325d9e0cce5ea42

    • C:\Users\Admin\AppData\Local\Temp\3a953da50bb2efad589b0f37442ea696_jaffacakes118\3a953da50bb2efad589b0f37442ea696_jaffacakes118.exe

      Filesize

      664KB

      MD5

      3a953da50bb2efad589b0f37442ea696

      SHA1

      1d3818f6e7682b59116aa99483a42e1589c1cd92

      SHA256

      bbcc1239e936c0fab9f67dbd6013fe301eaae1833d153ecdb2824ea6274014ea

      SHA512

      381be4093996457274b9cf23badfc452a777dd80cf050c83d979dc9cd2cea9b5b55573552d4d1992124e0740c81c97ee76f5c0e5665731a8a4afd858b8c31360

    • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

      Filesize

      53B

      MD5

      0b14567e25c17a8e4db00de35298b662

      SHA1

      3a12f997aea17ba8e3a26cc402e1001f7b4ca653

      SHA256

      a1c123735b78114f897de568439c91685a8013c29a0b22b135cdfbf3f2a34297

      SHA512

      49a4889fea5ce994a80ae8d6617833ee036eae708226e279124af67e025ddcd3033c54184c8721337c94cb477d640a6dd1d768c78c28e9839b5f08ab11680912

    • memory/3688-49-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-47-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-48-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-45-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-50-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-51-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-40-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-41-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-39-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3688-46-0x0000000008620000-0x0000000008621000-memory.dmp

      Filesize

      4KB

    • memory/3748-8-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/3748-10-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/3748-7-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/3748-9-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/3748-13-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/3748-29-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4156-5-0x0000000074C72000-0x0000000074C73000-memory.dmp

      Filesize

      4KB

    • memory/4156-1-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4156-12-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4156-2-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4156-3-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4156-0-0x0000000074C72000-0x0000000074C73000-memory.dmp

      Filesize

      4KB

    • memory/4156-4-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4156-6-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4944-28-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4944-26-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4944-27-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4944-30-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB

    • memory/4944-33-0x0000000074C70000-0x0000000075221000-memory.dmp

      Filesize

      5.7MB