Analysis

  • max time kernel
    161s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 23:17

General

  • Target

    4384015f0e7a2c6e3738fc2492cc1075_JaffaCakes118.exe

  • Size

    746KB

  • MD5

    4384015f0e7a2c6e3738fc2492cc1075

  • SHA1

    0dfa27fc3204ebfa172cd1eb97f798914b006140

  • SHA256

    daaed52990a467051c10ef429b4b4546833ac831ceb1e14e15d3a9d9e1e775ab

  • SHA512

    7131c88d0987142e66d9b7247902e18e7951896998a66f725515f8d8b8b4e24ccffe73b457ccf34dd764297b14cd095e19e0af79cacc5b67c7e4f1ac733b27dd

  • SSDEEP

    12288:8NgEvTkYGzXUMA7PTgM0YOg26y4RtcxcUwhqb3omaY80NP6gL:8XTszE7PTgM0YOgA4RtcbwhsSYFVL

Malware Config

Signatures

  • Ammyy Admin

    Remote admin tool with various capabilities.

  • AmmyyAdmin payload 3 IoCs
  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Drops file in System32 directory 4 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4384015f0e7a2c6e3738fc2492cc1075_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4384015f0e7a2c6e3738fc2492cc1075_JaffaCakes118.exe"
    1⤵
      PID:1588
    • C:\Users\Admin\AppData\Local\Temp\4384015f0e7a2c6e3738fc2492cc1075_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4384015f0e7a2c6e3738fc2492cc1075_JaffaCakes118.exe" -service -lunch
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\4384015f0e7a2c6e3738fc2492cc1075_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\4384015f0e7a2c6e3738fc2492cc1075_JaffaCakes118.exe"
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:216
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1616

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\AMMYY\hr

        Filesize

        22B

        MD5

        d661eb9f8d31d580710e8e2e76d9a22e

        SHA1

        22bcc4d5e883c4eefc8fa6a5e029b838b69009d5

        SHA256

        e969950c5e449851b6ed56d187fd3b7225614a27f2f3e854188fc3635a92e6f4

        SHA512

        dfd56347cdb320c41685e3a5bc44901452dd2d6c311213ddcf608048540238abebba3bc79ec24e5364626fe51b561057fda7a984b9040bdeb79bde8e5f99ad82

      • C:\ProgramData\AMMYY\hr3

        Filesize

        68B

        MD5

        9acaba3d652a41c94eeb6bd9c19d6a79

        SHA1

        577be3517698f5bff89d4103b4a1f28fef5e7678

        SHA256

        bbbd08f62c80aeaf81c07831aca29c7dd47796a54b9d2419f75f4092528983e6

        SHA512

        e101e244ae80245371839c874b9e16c3e66ddca35b51da4f69501d1b4f90ae261d2a7a724146523e92d4dc0edb92513ebd0ea7799ed71e6add153bd752eca16a

      • C:\ProgramData\AMMYY\settings3.bin

        Filesize

        271B

        MD5

        714f2508d4227f74b6adacfef73815d8

        SHA1

        a35c8a796e4453c0c09d011284b806d25bdad04c

        SHA256

        a5579945f23747541c0e80b79e79375d4ca44feafcd425ee9bd9302e35312480

        SHA512

        1171a6eac6d237053815a40c2bcc2df9f4209902d6157777377228f3b618cad50c88a9519444ed5c447cf744e4655272fb42dabb567df85b4b19b1a2f1d086d8

      • memory/1588-0-0x0000000000400000-0x00000000004D4000-memory.dmp

        Filesize

        848KB

      • memory/1588-6-0x0000000000400000-0x00000000004D4000-memory.dmp

        Filesize

        848KB

      • memory/4108-5-0x0000000000400000-0x00000000004D4000-memory.dmp

        Filesize

        848KB