Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 01:23

General

  • Target

    7f1113759d043a2c80292266b6362eb6_JaffaCakes118.exe

  • Size

    651KB

  • MD5

    7f1113759d043a2c80292266b6362eb6

  • SHA1

    90be21b50046af5eba74e6632623fb2aac6d5e14

  • SHA256

    6f8eba1ab9c3dfb62c267f46e25e70021ac4b7eeeef6601fd5b2aa35fbab5d94

  • SHA512

    6aaa039653d66cf0b719223dec54f710a66ff38c4ec2eaa63d02b8c3d3282d727850fb098f8ca1cb072b534d74192f577640f376af051dbdd6384740bcc4f4b1

  • SSDEEP

    12288:wFetEQ3+mwI86GbFGUMpKBosjzA+BLPD:w4PuLx6wFrMN+BL7

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f1113759d043a2c80292266b6362eb6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7f1113759d043a2c80292266b6362eb6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Users\Admin\AppData\Local\Temp\7f1113759d043a2c80292266b6362eb6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\7f1113759d043a2c80292266b6362eb6_JaffaCakes118.exe"
      2⤵
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

    Filesize

    50B

    MD5

    43649950679fc5173a705bed43ffdb9b

    SHA1

    60a10a2e4048d55d147b0e3f469675fe2ac0f0dd

    SHA256

    57a84af898a451a5ceb3bc4b74bf4ca1f912cd9aadbb5bba36fe7bcdac0f6370

    SHA512

    511c6cb74ff95ad23af2bea07426107647ef20691fbbc596b582db95ac9eedebec11c8ff63f7f9d184df4649b1bdda5b7d12475d8805b42fcbfd32ebabac2027

  • memory/3792-5-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3792-6-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3792-7-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3792-40-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4888-0-0x0000000075202000-0x0000000075203000-memory.dmp

    Filesize

    4KB

  • memory/4888-1-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4888-2-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4888-18-0x0000000075200000-0x00000000757B1000-memory.dmp

    Filesize

    5.7MB