Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 17:09
Behavioral task
behavioral1
Sample
7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe
-
Size
994KB
-
MD5
7dba4a5315a513445fcc54d3a8deeffb
-
SHA1
dd9bef6d37edda1cdc62704a79bcad3c05575dd3
-
SHA256
13263de73c77edc4df42b52898b5624ebc2635d463545d0b14f380290ed74903
-
SHA512
6bcc95e72dd42da4434c28dfdebcf9a8e973e753bd11f3f32f36b0f2fe19e7fc379f10b16d0dd4befe01630d5c2c25dab71b1278b35674bb71c46d029d71ab07
-
SSDEEP
24576:4MjPJ5g9KVGrdNikfu2hBfK8ilRty5olGJsx1:dJ5gEKNikf3hBfUiWx1
Malware Config
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\budha.exe family_ammyyadmin -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
Processes:
budha.exepid process 1528 budha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exedescription pid process target process PID 1188 wrote to memory of 1528 1188 7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe budha.exe PID 1188 wrote to memory of 1528 1188 7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe budha.exe PID 1188 wrote to memory of 1528 1188 7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe budha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7dba4a5315a513445fcc54d3a8deeffb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\budha.exe"C:\Users\Admin\AppData\Local\Temp\budha.exe"2⤵
- Executes dropped EXE
PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD55e1c75532fe6f598469607091e49c0d9
SHA1a92e6068555f4cb44a96a13a668b75ce6d51b169
SHA2562ec7fb988ebb1a371f096b7a47dd6aea844164b79b94c1181053d8348182aaf9
SHA5124978a8aa1bd4d9f8370359ea972ec8150d550171f5774da901bc98f6efea9e34ceb95810acfd24cff4be2df3a7f0527224cc9adc5d74a1f61e80efe59a95a22e