Analysis

  • max time kernel
    140s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 10:41

General

  • Target

    917a710a90cf864397280cf6dae469d6_JaffaCakes118.exe

  • Size

    919KB

  • MD5

    917a710a90cf864397280cf6dae469d6

  • SHA1

    314b6a24cabc47bebd3bcf3d7bbb1f26717872c8

  • SHA256

    20408828648dda9ca5cf43e2b3d5f0937fcad545b9e28380edd03e992086ac8f

  • SHA512

    abadff2e10b82fb3879f13c3761d251c2f8b1123e9b0748ef57dfe086d8e642eee916cbb8b4c335cd86d4a6ebc06cf7f82070ab07b3976b9bf2a848995b14936

  • SSDEEP

    12288:4OvTLDi4ZJkC5KnkKu59bbk33H4U6l2dI7k:4QTCKkIRW3Xml2d

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917a710a90cf864397280cf6dae469d6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\917a710a90cf864397280cf6dae469d6_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\client3.exe
      "C:\Users\Admin\AppData\Local\Temp\client3.exe"
      2⤵
      • Drops startup file
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" /c select, C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winscit.exe
        3⤵
          PID:1192
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winscit.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winscit.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1576
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:1832

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winscit.exe

        Filesize

        919KB

        MD5

        917a710a90cf864397280cf6dae469d6

        SHA1

        314b6a24cabc47bebd3bcf3d7bbb1f26717872c8

        SHA256

        20408828648dda9ca5cf43e2b3d5f0937fcad545b9e28380edd03e992086ac8f

        SHA512

        abadff2e10b82fb3879f13c3761d251c2f8b1123e9b0748ef57dfe086d8e642eee916cbb8b4c335cd86d4a6ebc06cf7f82070ab07b3976b9bf2a848995b14936

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

        Filesize

        400B

        MD5

        e632519d74c73a3734ea0d722c3af63d

        SHA1

        70d7910cb46510839d5bf81ce0a29a2b27d158fd

        SHA256

        606a2094321581e378dd64619f17835c18684faaed67bfb4326dad1d69950808

        SHA512

        1f6edb0d976c900be4e01fa3054467b654127c7cf40ef14aa618e762917f31aba2b52436f444a5a369fc8e70a907cb8a1dfe3edddb8741fbc7b1a4b171ad439d

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

        Filesize

        830B

        MD5

        157cd5fc8ebe4f5fe555e60978361922

        SHA1

        f2e13669906c646a72eb566b52b1de29d9ceb82d

        SHA256

        e430ccaa131307f12a5679125f92a646108e21093cd9aaacae03a0f70755b04f

        SHA512

        d1aacc630e97c828dee1983358cd0dde4b12a38d30e9583df063ba38977435d2c25c8eb194d9fe6545fefd45451001fd997229a26c6d89c0a89d8a79878a572f

      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch

        Filesize

        478B

        MD5

        a95eea54f6b8d2e61b6b95462adabd68

        SHA1

        5aa6a67406032a6cfa6d5e0307caa5fe1b9bc017

        SHA256

        bb644f378db7e044bcebb8bfe1f1a06f4fb07618088936ca88750cde647070e8

        SHA512

        9d3a1a73006996fa57e686f8e6090fd71802251b50e5d4a856be53816c1182d5ec822ce208cbf05163e15095b14187af00fdcd6f9afd39d90a9904774d3b27f9

      • memory/1576-31-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1576-30-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/1576-29-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/2204-3-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2204-11-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2204-0-0x0000000074471000-0x0000000074472000-memory.dmp

        Filesize

        4KB

      • memory/2204-1-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2204-2-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2940-12-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2940-23-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2940-14-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2940-13-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2940-7-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB

      • memory/2940-10-0x0000000074470000-0x0000000074A1B000-memory.dmp

        Filesize

        5.7MB