Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 18:04

General

  • Target

    8500c39508fe630ae0295ecf59330550_JaffaCakes118.exe

  • Size

    729KB

  • MD5

    8500c39508fe630ae0295ecf59330550

  • SHA1

    47529bf0f19a68856fba35c56e34ab19125da4a5

  • SHA256

    c22d5da8c6f9ca4592e1aecd967a95c479c7d0a15e65606ca1d3d6c01ac550c6

  • SHA512

    6890c3b4976cab879101336d1ff165b3509cb04644d330feb677344cdf48162dc4d0ffed4d6c473e99c06b1efade5e799d157ad4b67ed9a61e9d87cd3b9713eb

  • SSDEEP

    12288:HLZGxCemTW1m24nS32rVZwusk1ErPTzbE+m+N+fk5xbzH:rZIq2xmZYyEr7U+fNE2bD

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8500c39508fe630ae0295ecf59330550_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8500c39508fe630ae0295ecf59330550_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4676
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\8500c39508fe630ae0295ecf59330550_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\svs.exe"
      2⤵
        PID:4340
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\svs.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4696
        • C:\Users\Admin\AppData\Local\svs.exe
          "C:\Users\Admin\AppData\Local\svs.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3268
          • C:\Users\Admin\AppData\Local\svs.exe
            "C:\Users\Admin\AppData\Local\svs.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4800
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4176,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:8
      1⤵
        PID:1732
      • C:\Windows\system32\wbem\WmiApSrv.exe
        C:\Windows\system32\wbem\WmiApSrv.exe
        1⤵
          PID:3268

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\svs.exe

          Filesize

          729KB

          MD5

          8500c39508fe630ae0295ecf59330550

          SHA1

          47529bf0f19a68856fba35c56e34ab19125da4a5

          SHA256

          c22d5da8c6f9ca4592e1aecd967a95c479c7d0a15e65606ca1d3d6c01ac550c6

          SHA512

          6890c3b4976cab879101336d1ff165b3509cb04644d330feb677344cdf48162dc4d0ffed4d6c473e99c06b1efade5e799d157ad4b67ed9a61e9d87cd3b9713eb

        • memory/3268-25-0x0000000075210000-0x00000000759C0000-memory.dmp

          Filesize

          7.7MB

        • memory/3268-20-0x0000000007820000-0x00000000078BC000-memory.dmp

          Filesize

          624KB

        • memory/3268-18-0x0000000075210000-0x00000000759C0000-memory.dmp

          Filesize

          7.7MB

        • memory/3268-17-0x0000000075210000-0x00000000759C0000-memory.dmp

          Filesize

          7.7MB

        • memory/3268-16-0x0000000075210000-0x00000000759C0000-memory.dmp

          Filesize

          7.7MB

        • memory/4676-5-0x0000000005950000-0x000000000595A000-memory.dmp

          Filesize

          40KB

        • memory/4676-1-0x0000000000C90000-0x0000000000D4C000-memory.dmp

          Filesize

          752KB

        • memory/4676-10-0x0000000075210000-0x00000000759C0000-memory.dmp

          Filesize

          7.7MB

        • memory/4676-12-0x0000000075210000-0x00000000759C0000-memory.dmp

          Filesize

          7.7MB

        • memory/4676-6-0x0000000075210000-0x00000000759C0000-memory.dmp

          Filesize

          7.7MB

        • memory/4676-0-0x000000007521E000-0x000000007521F000-memory.dmp

          Filesize

          4KB

        • memory/4676-4-0x00000000057B0000-0x00000000057CE000-memory.dmp

          Filesize

          120KB

        • memory/4676-3-0x0000000005710000-0x00000000057A2000-memory.dmp

          Filesize

          584KB

        • memory/4676-2-0x0000000005C20000-0x00000000061C4000-memory.dmp

          Filesize

          5.6MB

        • memory/4676-9-0x000000007521E000-0x000000007521F000-memory.dmp

          Filesize

          4KB

        • memory/4800-21-0x0000000000400000-0x0000000000456000-memory.dmp

          Filesize

          344KB

        • memory/4800-24-0x0000000001040000-0x0000000001050000-memory.dmp

          Filesize

          64KB

        • memory/4800-27-0x00000000050E0000-0x0000000005108000-memory.dmp

          Filesize

          160KB

        • memory/4800-26-0x00000000052F0000-0x000000000539E000-memory.dmp

          Filesize

          696KB

        • memory/4800-28-0x0000000005B10000-0x0000000005B76000-memory.dmp

          Filesize

          408KB

        • memory/4800-29-0x0000000006380000-0x0000000006398000-memory.dmp

          Filesize

          96KB

        • memory/4800-30-0x00000000067F0000-0x0000000006806000-memory.dmp

          Filesize

          88KB