Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    18-06-2024 08:42

General

  • Target

    bad10e7a73dc3f07ccfc1031b4be97dc_JaffaCakes118.exe

  • Size

    206KB

  • MD5

    bad10e7a73dc3f07ccfc1031b4be97dc

  • SHA1

    200edd71a5ab8c08fc0542b61bd18943eefc59bb

  • SHA256

    c809e2e044199a760b4b82f46e0b91eccd1868a8ecdfd4b46d0aab13e97dd5c1

  • SHA512

    ab1a1274b0a98b6029369fcd49ece52d8f5ad049e15e4c06fca6ab91cf8447fd5f692412b71819e29b08494c0236b925e3dfea2de33259a211a70f9ccceecff5

  • SSDEEP

    3072:imLGeqioyN51MpjgPsoAbh2WtwAeyK4QupNwyb5O0koHy930n1Fb/nbgoA:qeTV4pjgk3F1iAy4fo61q9I/

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bad10e7a73dc3f07ccfc1031b4be97dc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bad10e7a73dc3f07ccfc1031b4be97dc_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

    Filesize

    59B

    MD5

    22f3c2851fecaa44e84ce97535507dbf

    SHA1

    766f3c7511d541159fa56b5c63eea98e2bdc52e0

    SHA256

    bcec886ba638ba8e18660953a497f1c5bcfeaa924cfc2d4a39a4efdcb7297087

    SHA512

    c54dddc1596195e79b8ef2797b35756282f6e4633a862c14db4a935969a85354274553d2040943d59342a64e327f365ca83d8fc578c33bb55c3e37cd5a5b5a3c

  • memory/1280-0-0x000007FEF5D6E000-0x000007FEF5D6F000-memory.dmp

    Filesize

    4KB

  • memory/1280-1-0x000007FEF5AB0000-0x000007FEF644D000-memory.dmp

    Filesize

    9.6MB

  • memory/1280-2-0x0000000000DB0000-0x0000000000E0E000-memory.dmp

    Filesize

    376KB

  • memory/1280-3-0x00000000012C0000-0x00000000012E8000-memory.dmp

    Filesize

    160KB

  • memory/1280-5-0x00000000005A0000-0x00000000005AE000-memory.dmp

    Filesize

    56KB

  • memory/1280-19-0x000007FEF5D6E000-0x000007FEF5D6F000-memory.dmp

    Filesize

    4KB

  • memory/1280-20-0x000007FEF5AB0000-0x000007FEF644D000-memory.dmp

    Filesize

    9.6MB

  • memory/1280-25-0x0000000001360000-0x000000000136C000-memory.dmp

    Filesize

    48KB

  • memory/1280-26-0x0000000001350000-0x0000000001366000-memory.dmp

    Filesize

    88KB