Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-05-2024 07:47

General

  • Target

    3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    3e6f710d5ae5cc28ea528b6c285b3a97

  • SHA1

    d0887a05e2bc934506f7ab95148078abd1ebe602

  • SHA256

    ecc1495235b5c7a3199f7e18441c3c5021427d817a80c3bdaa3190bbd8b2d432

  • SHA512

    3d641450d33fbac9649e0ccd3d124d128db8610f57d234b27dcad0d31e12005c37d09b8abe1ee135cc36f3a77aefe597ed062854e5a17839b312582b6b91abd8

  • SSDEEP

    12288:+Kbl0PnKIgr4N50rI7mbV28MqXB6E4q4oQS:+CUPgcNak0V28DgE49S

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3312
    • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3524
        • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:224
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_JaffaCakes118.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3120
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:4384
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1032 --field-trial-handle=2280,i,716736634476467098,11449718822158202904,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3376
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:528

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe.log

        Filesize

        1KB

        MD5

        13aebabe1d99d883b70bc62d943b9f89

        SHA1

        a3d41415e9b28f8245d18dabf1f050e083c8aa87

        SHA256

        4cc656f4c5c0fcd14b98a5069d7328fe5d94b617e5b042148964712d22d50463

        SHA512

        eabc7340cb077872f97df766b02fe3b1145d344cfc9fa3911ff7b89811e124a0ded76edfa8a9d0d7c56cf93e4807ba13c99e352d9046cf22a0d9d1bdaa651c40

      • C:\Users\Admin\AppData\Local\Temp\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118\3e6f710d5ae5cc28ea528b6c285b3a97_jaffacakes118.exe

        Filesize

        1.0MB

        MD5

        3e6f710d5ae5cc28ea528b6c285b3a97

        SHA1

        d0887a05e2bc934506f7ab95148078abd1ebe602

        SHA256

        ecc1495235b5c7a3199f7e18441c3c5021427d817a80c3bdaa3190bbd8b2d432

        SHA512

        3d641450d33fbac9649e0ccd3d124d128db8610f57d234b27dcad0d31e12005c37d09b8abe1ee135cc36f3a77aefe597ed062854e5a17839b312582b6b91abd8

      • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

        Filesize

        44B

        MD5

        2c8643b9c679aa067e11a4d26c9a994f

        SHA1

        2afc9e72840070a36d131d82d0a40e02c875a2a9

        SHA256

        0ff6b67298aa8c2fbe8a4c510894936d8cee1ecbe262f1341ddb88899ab2bed9

        SHA512

        3f1602fabde743dc90afe030b758a2e0ceebd302e0e62e23b5bef24139cb3aa01cf7a0301de56e75290d5f675efa1b386bf09a3d59c686cc93521c16d995f685

      • memory/224-41-0x0000000007840000-0x0000000007856000-memory.dmp

        Filesize

        88KB

      • memory/3312-7-0x000000000A3C0000-0x000000000A45C000-memory.dmp

        Filesize

        624KB

      • memory/3312-11-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/3312-6-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/3312-0-0x00000000747CE000-0x00000000747CF000-memory.dmp

        Filesize

        4KB

      • memory/3312-8-0x000000000A3B0000-0x000000000A3BA000-memory.dmp

        Filesize

        40KB

      • memory/3312-9-0x00000000747CE000-0x00000000747CF000-memory.dmp

        Filesize

        4KB

      • memory/3312-5-0x0000000002770000-0x0000000002776000-memory.dmp

        Filesize

        24KB

      • memory/3312-4-0x0000000004D70000-0x0000000004D8A000-memory.dmp

        Filesize

        104KB

      • memory/3312-1-0x00000000002C0000-0x00000000003C8000-memory.dmp

        Filesize

        1.0MB

      • memory/3312-2-0x00000000053F0000-0x0000000005994000-memory.dmp

        Filesize

        5.6MB

      • memory/3312-3-0x0000000004EE0000-0x0000000004F72000-memory.dmp

        Filesize

        584KB

      • memory/3312-18-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/3524-33-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/3524-34-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/3524-38-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/4120-10-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/4120-20-0x0000000007000000-0x0000000007018000-memory.dmp

        Filesize

        96KB

      • memory/4120-19-0x0000000006900000-0x0000000006966000-memory.dmp

        Filesize

        408KB

      • memory/4120-17-0x0000000008CF0000-0x0000000008D18000-memory.dmp

        Filesize

        160KB

      • memory/4120-16-0x00000000057B0000-0x000000000585E000-memory.dmp

        Filesize

        696KB

      • memory/4120-35-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/4120-14-0x00000000030C0000-0x00000000030D0000-memory.dmp

        Filesize

        64KB

      • memory/4120-13-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB

      • memory/4120-12-0x00000000747C0000-0x0000000074F70000-memory.dmp

        Filesize

        7.7MB