Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 13:58

General

  • Target

    a0e983ac9bc736fc036deb22f66fac7b_JaffaCakes118.exe

  • Size

    839KB

  • MD5

    a0e983ac9bc736fc036deb22f66fac7b

  • SHA1

    263992909fcfbbb3f4bebbd72de6076e7bbbc35e

  • SHA256

    d02ac25c541c1db2c472c3911c85102d1696ea91e7c7f91d5223f05c9578a4d6

  • SHA512

    7c7f11eb5d55291f4a3cd21cd486b7338c5eb2cfe8f94217c0cd6d75919994b6b36ddb7c829d9c596df9f227dcdc8d3a1ff7be42c35b9dc3f525fba4ff60edb2

  • SSDEEP

    12288:+bOrWJ/dY02/a7yOWzNc4GG1bGd6H5FX+K3gszVXVxzIcz5muGpia2QUVH:HyV9sa77m5b1bGqdVFxzb5mlA

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0e983ac9bc736fc036deb22f66fac7b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a0e983ac9bc736fc036deb22f66fac7b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" /c select, C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msiwin.exe
      2⤵
        PID:2372
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msiwin.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msiwin.exe"
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"
          3⤵
          • Drops desktop.ini file(s)
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3040
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4980

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msiwin.exe

              Filesize

              839KB

              MD5

              a0e983ac9bc736fc036deb22f66fac7b

              SHA1

              263992909fcfbbb3f4bebbd72de6076e7bbbc35e

              SHA256

              d02ac25c541c1db2c472c3911c85102d1696ea91e7c7f91d5223f05c9578a4d6

              SHA512

              7c7f11eb5d55291f4a3cd21cd486b7338c5eb2cfe8f94217c0cd6d75919994b6b36ddb7c829d9c596df9f227dcdc8d3a1ff7be42c35b9dc3f525fba4ff60edb2

            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch

              Filesize

              478B

              MD5

              e738ab2a73b30f7d7e2f94693b1daf8d

              SHA1

              9d7019a5c420f58c98d1c133326e4872128d0146

              SHA256

              013df302bd86185568a29122f0b7db6139ddf39b151eb2a8a669f4b454cd2037

              SHA512

              56acdc5ad1c74f5130f8baaf3db9a2cae4c5537f9657d0bf7f6e6ef19b57d1c54cf63f141d32121328f1479003951d4764fa62685feee4562e83e099d5cce0b1

            • memory/3040-17-0x0000000000400000-0x0000000000456000-memory.dmp

              Filesize

              344KB

            • memory/5044-0-0x0000000074732000-0x0000000074733000-memory.dmp

              Filesize

              4KB

            • memory/5044-1-0x0000000074730000-0x0000000074CE1000-memory.dmp

              Filesize

              5.7MB

            • memory/5044-2-0x0000000074730000-0x0000000074CE1000-memory.dmp

              Filesize

              5.7MB

            • memory/5044-3-0x0000000074730000-0x0000000074CE1000-memory.dmp

              Filesize

              5.7MB

            • memory/5044-4-0x0000000074730000-0x0000000074CE1000-memory.dmp

              Filesize

              5.7MB

            • memory/5044-5-0x0000000074732000-0x0000000074733000-memory.dmp

              Filesize

              4KB

            • memory/5044-12-0x0000000074730000-0x0000000074CE1000-memory.dmp

              Filesize

              5.7MB