Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-05-2024 07:47

General

  • Target

    3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    3e6f710d5ae5cc28ea528b6c285b3a97

  • SHA1

    d0887a05e2bc934506f7ab95148078abd1ebe602

  • SHA256

    ecc1495235b5c7a3199f7e18441c3c5021427d817a80c3bdaa3190bbd8b2d432

  • SHA512

    3d641450d33fbac9649e0ccd3d124d128db8610f57d234b27dcad0d31e12005c37d09b8abe1ee135cc36f3a77aefe597ed062854e5a17839b312582b6b91abd8

  • SSDEEP

    12288:+Kbl0PnKIgr4N50rI7mbV28MqXB6E4q4oQS:+CUPgcNak0V28DgE49S

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1492
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"
        3⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:1664
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2196

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

      Filesize

      44B

      MD5

      2c8643b9c679aa067e11a4d26c9a994f

      SHA1

      2afc9e72840070a36d131d82d0a40e02c875a2a9

      SHA256

      0ff6b67298aa8c2fbe8a4c510894936d8cee1ecbe262f1341ddb88899ab2bed9

      SHA512

      3f1602fabde743dc90afe030b758a2e0ceebd302e0e62e23b5bef24139cb3aa01cf7a0301de56e75290d5f675efa1b386bf09a3d59c686cc93521c16d995f685

    • \Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe

      Filesize

      1.0MB

      MD5

      3e6f710d5ae5cc28ea528b6c285b3a97

      SHA1

      d0887a05e2bc934506f7ab95148078abd1ebe602

      SHA256

      ecc1495235b5c7a3199f7e18441c3c5021427d817a80c3bdaa3190bbd8b2d432

      SHA512

      3d641450d33fbac9649e0ccd3d124d128db8610f57d234b27dcad0d31e12005c37d09b8abe1ee135cc36f3a77aefe597ed062854e5a17839b312582b6b91abd8

    • memory/1492-34-0x0000000000770000-0x0000000000786000-memory.dmp

      Filesize

      88KB

    • memory/1896-5-0x0000000074230000-0x000000007491E000-memory.dmp

      Filesize

      6.9MB

    • memory/1896-4-0x0000000074230000-0x000000007491E000-memory.dmp

      Filesize

      6.9MB

    • memory/1896-0-0x000000007423E000-0x000000007423F000-memory.dmp

      Filesize

      4KB

    • memory/1896-1-0x0000000000D90000-0x0000000000E98000-memory.dmp

      Filesize

      1.0MB

    • memory/1896-2-0x0000000000460000-0x000000000047A000-memory.dmp

      Filesize

      104KB

    • memory/1896-12-0x0000000074230000-0x000000007491E000-memory.dmp

      Filesize

      6.9MB

    • memory/1896-3-0x00000000002A0000-0x00000000002A6000-memory.dmp

      Filesize

      24KB

    • memory/2616-14-0x0000000074230000-0x000000007491E000-memory.dmp

      Filesize

      6.9MB

    • memory/2616-15-0x0000000074230000-0x000000007491E000-memory.dmp

      Filesize

      6.9MB

    • memory/2616-8-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/2616-16-0x00000000022A0000-0x000000000234E000-memory.dmp

      Filesize

      696KB

    • memory/2616-17-0x0000000000510000-0x0000000000538000-memory.dmp

      Filesize

      160KB

    • memory/2616-11-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/2616-26-0x0000000074230000-0x000000007491E000-memory.dmp

      Filesize

      6.9MB

    • memory/2616-13-0x00000000001E0000-0x00000000001F0000-memory.dmp

      Filesize

      64KB

    • memory/2616-6-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/2808-25-0x00000000002D0000-0x00000000003D8000-memory.dmp

      Filesize

      1.0MB