Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 02:18

General

  • Target

    85b7c9fee7c501ec937cc92e7d200e8a_JaffaCakes118.exe

  • Size

    339KB

  • MD5

    85b7c9fee7c501ec937cc92e7d200e8a

  • SHA1

    d11aab5cd11599c3bf5c7790d28cc733c390354d

  • SHA256

    f7301f692415df25d494c99ab4cd2dd74648744ba910efef4076d6b4e98e26e7

  • SHA512

    996f895524c62da14b4314077c1b781ecbe86bb5b2eff4a30c8836011a8e94fe82c5517ff9e9cd9bc5e13b1ec5982a9f3174d19e0ab00c433358fcf511d8184e

  • SSDEEP

    6144:hWY+fpr3FPTjbB2a3z+BuUEPf9daN/Khl95uK2Z12yFsJPHb:hf+fpr3xTjb9zkuldOK/3N21FcPH

Score
10/10

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85b7c9fee7c501ec937cc92e7d200e8a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\85b7c9fee7c501ec937cc92e7d200e8a_JaffaCakes118.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4048
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:4912

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4048-0-0x00007FF9487B5000-0x00007FF9487B6000-memory.dmp

      Filesize

      4KB

    • memory/4048-1-0x00007FF948500000-0x00007FF948EA1000-memory.dmp

      Filesize

      9.6MB

    • memory/4048-2-0x000000001B000000-0x000000001B010000-memory.dmp

      Filesize

      64KB

    • memory/4048-3-0x00007FF948500000-0x00007FF948EA1000-memory.dmp

      Filesize

      9.6MB

    • memory/4048-4-0x000000001B150000-0x000000001B1F8000-memory.dmp

      Filesize

      672KB

    • memory/4048-5-0x000000001B0A0000-0x000000001B0C8000-memory.dmp

      Filesize

      160KB

    • memory/4048-6-0x000000001B8C0000-0x000000001B966000-memory.dmp

      Filesize

      664KB

    • memory/4048-7-0x000000001BE40000-0x000000001C30E000-memory.dmp

      Filesize

      4.8MB

    • memory/4048-8-0x000000001C4F0000-0x000000001C58C000-memory.dmp

      Filesize

      624KB

    • memory/4048-9-0x000000001CCC0000-0x000000001CD22000-memory.dmp

      Filesize

      392KB

    • memory/4048-10-0x000000001D080000-0x000000001D099000-memory.dmp

      Filesize

      100KB

    • memory/4048-11-0x000000001B430000-0x000000001B446000-memory.dmp

      Filesize

      88KB

    • memory/4048-14-0x000000001AFE0000-0x000000001AFE8000-memory.dmp

      Filesize

      32KB

    • memory/4048-16-0x00007FF948500000-0x00007FF948EA1000-memory.dmp

      Filesize

      9.6MB

    • memory/4048-21-0x00007FF9487B5000-0x00007FF9487B6000-memory.dmp

      Filesize

      4KB

    • memory/4048-22-0x00007FF948500000-0x00007FF948EA1000-memory.dmp

      Filesize

      9.6MB

    • memory/4048-23-0x00007FF948500000-0x00007FF948EA1000-memory.dmp

      Filesize

      9.6MB