Analysis
-
max time kernel
142s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 12:06
Behavioral task
behavioral1
Sample
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe
-
Size
994KB
-
MD5
54a1556548c5044b244a4a3b9f43f16f
-
SHA1
5ac83e445f6c8004e7ab4d51f1f7ba3e4eab89fa
-
SHA256
490d94ddc0d29c728d676c84ee626a05c2105dd18c2ddd7bbde6b4a30d010699
-
SHA512
20998502d49cd199737ecffc63692091b59b98f06bcccc2170754da6c7043b8df0b9842b16f52877d712e0d27b5e072b8ae67033b3eba6adfef62b2f3f7252b8
-
SSDEEP
24576:4MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsx/:dJ5gEKNikf3hBfUiWx/
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\budha.exe family_ammyyadmin -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 1704 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exedescription pid process target process PID 4716 wrote to memory of 1704 4716 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe budha.exe PID 4716 wrote to memory of 1704 4716 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe budha.exe PID 4716 wrote to memory of 1704 4716 54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54a1556548c5044b244a4a3b9f43f16f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD59540878ae0ef978d7655e594b13d7f88
SHA1ae6a565fddb91cec9aa541adc92f847b35ed783d
SHA2567d25821febd290bc12edf959afb08f69228177fc2b8e5f2276711772d104016f
SHA51234215f7780f47cfac6027693492ca3aae3b19fcc9251c20cea5352de48e25a53d131318c56c3ca91bb37ba9f9e0ea214d7d230aced2fb5a8240e140d669fe0b1