Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 04:33
Behavioral task
behavioral1
Sample
7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe
-
Size
756KB
-
MD5
7f80b6c61c6849a43f28cafd75b4f8a6
-
SHA1
bddb2615c0d77763d6b67a4518646d40afb46fda
-
SHA256
80d99ecd3257ffbea3f4eab3ad67a0925670700896a6e8fec5e334f67398e1f3
-
SHA512
4b8594b6a3597dc9c10cbe873d022f2b6b0b67e28be92f9479f07fb3f643c7286d414a3f0b611daab4cc50a91e18e34263f5007400ba31e921f1d1926bb0181e
-
SSDEEP
12288:cX5PFc+E0SlpOvcC1KL/q/IZVURtCdshX5x8jR31QEY0VE+gP:+P++ZSlpOUC1KT4+URtYshX5aRlQEYrP
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\Geo\Nation 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr3 = 148bccaac338109fd7b376b88401036b78d1c032dae94c5d82d820ff7bf1a2b1c1b5278dacb4adfe5178a858fd8baddfff5438c2de8cf341185c3ccda4c0d12ba97353f5 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exepid process 1208 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exepid process 1208 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exedescription pid process target process PID 1768 wrote to memory of 1208 1768 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe PID 1768 wrote to memory of 1208 1768 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe PID 1768 wrote to memory of 1208 1768 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe PID 1768 wrote to memory of 1208 1768 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe 7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe"1⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe" -service -lunch1⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7f80b6c61c6849a43f28cafd75b4f8a6_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358B
MD57f8803567514be9f7adedd51a77c414d
SHA16fddccda062b8553e15845e72ad62e79ced9905b
SHA256bbd09f97009a10db7814c309a10a7737d0d9ccd182ba5dc86e18e473f222b3b8
SHA512966a4f56263959f63bb4ef30c9d1f506251f9c7bfd3fa3a0c98f28ea872add81b118a9aecb433e3d72eb24dae09aea4e656d46324577a94e25122d5cc3d774ee