Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2024 21:42

General

  • Target

    c5cbe27159d3c5bb095f1bdb75bf0d95_JaffaCakes118.exe

  • Size

    464KB

  • MD5

    c5cbe27159d3c5bb095f1bdb75bf0d95

  • SHA1

    73fb46b8ac71bbc8cbbbf49e52f1ed1091fe0ec6

  • SHA256

    1b219bfed6210a9679570032bba9c2b209a0c06ea3e07b94df7727767472c9d3

  • SHA512

    da6cf62c72e1b151733c5a88620fc7ed5c725125ad8490b75fca5ba6ee6760bcf2f5342b374f7a170bae775621424a8c0291c9a4fb20422d03afcec6add5ef80

  • SSDEEP

    12288:uxGfMUSKRLRYWcswKpxe66WglV1s3kUu1nDLH0W+SIz/7Y9EObzcZwj2ZX:FR6W4MheLHb+Dz7YWObzKwC9

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5cbe27159d3c5bb095f1bdb75bf0d95_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c5cbe27159d3c5bb095f1bdb75bf0d95_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\k320fzy3\k320fzy3.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5781.tmp" "c:\Users\Admin\AppData\Local\Temp\k320fzy3\CSCCF6505B5AFFD481C854245802CB7128.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1224
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4704
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4156,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4016 /prefetch:8
    1⤵
      PID:2248
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4480

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES5781.tmp

        Filesize

        1KB

        MD5

        46a24bfa3d25519d269526b1165265b6

        SHA1

        fab91344eb1081fb3a83dd3457216f2f712aca3a

        SHA256

        172b018e3d953343c74eab05da67274d49f7950d1bac9b1796ccd20e66693dbf

        SHA512

        cbccbe3a9857cd0837ac5fd84ee90091c0070c8c80c848ebe968fcd5291a537ec834eb0af6da5842501a9cb2eb1a79ff041e1b892890a019c01c33327bcbdb7a

      • C:\Users\Admin\AppData\Local\Temp\k320fzy3\k320fzy3.dll

        Filesize

        16KB

        MD5

        be71a59e2ea4c74501825d1f7ba3fa63

        SHA1

        8948428d188dfdf9cc23ee589b0a567e0de0a320

        SHA256

        bef08f3e57f1fbab90d96048e966530bcdf92fe38eb51c8af3d16fb0d8c77390

        SHA512

        2fbed86e694e1ee29499a42fbd8fc84c61a1029623be1473afc393310b9c2a4a868a8a109802d16da138993513ac535252983872506136384007420ffcf045bc

      • C:\Users\Admin\AppData\Local\Temp\k320fzy3\k320fzy3.pdb

        Filesize

        49KB

        MD5

        8c6d90eee3f4f4caa902904aec64b0e9

        SHA1

        a82c4cf5c5c16755d5f2f1564389029f9c92b99b

        SHA256

        6b8140a8b1193baee696ee2371a2ca2bed20ea055a1c7694309bc3fe74348c33

        SHA512

        ae8b852660253e12d507c92de24b0d8c5dd1fc6c25e2aaa19ce5c267651d479c280f89acc63dde802d0115ddcab4bc671ca42dd6d5bae9720836cc9f8808d7e1

      • \??\c:\Users\Admin\AppData\Local\Temp\k320fzy3\CSCCF6505B5AFFD481C854245802CB7128.TMP

        Filesize

        1KB

        MD5

        3d4637bc365e546e58a5168939dd0e3d

        SHA1

        c50d6b951c59133b0b4fc16a2880675db870e03c

        SHA256

        0b251ce26e42bf5c4bf5ae34359ed7fd301c7f02f3a0d0e1255fef6c9c4981fc

        SHA512

        b5031883587ac1ccd632a9ae129b7af27a923711ec07ea76aac08c1e40d8802bd17ca4362b878431f4299c5d5fcd150333e58724021bf11a86dbda6d7f2598dd

      • \??\c:\Users\Admin\AppData\Local\Temp\k320fzy3\k320fzy3.0.cs

        Filesize

        35KB

        MD5

        7e6c866ffbdec7a2d4a9da215a8cfcf8

        SHA1

        9f60f4c44306385119ef6d5f24162b9db9452d2f

        SHA256

        9f41693eec13e207e59c0896f3c24ef786c0a5ad2b6181b00579c3fb80ca7fc8

        SHA512

        7467c895fb28610819e0fa22a288a7d29d828c197fedfdd71b76bbe82c80df256020852d2d1089c44832d7a5e389d722d4ec05a259ac0eeb4494bc0f15b4d89d

      • \??\c:\Users\Admin\AppData\Local\Temp\k320fzy3\k320fzy3.cmdline

        Filesize

        312B

        MD5

        db6e947b2a4484c0814a99e0fcbb4a8d

        SHA1

        3e3338ee5488dd0e2ce04a3fe8f88541d545b03b

        SHA256

        cc45bdcb6fffcac1e6701b0ffc762bed8c8d9491984ea296bf23e4ae34ab1e5a

        SHA512

        26fa1dcc4412fd7f6dd0f83e87b5fea3cfc3ee5e0f5e3b2c437c3b8c268766d44bfdb6f65d71dac03e77ec924c1a817f118203ca6cacdfd566a970cb0ab4c2b8

      • memory/1528-25-0x0000000005160000-0x00000000051FC000-memory.dmp

        Filesize

        624KB

      • memory/1528-28-0x00000000749F0000-0x00000000751A0000-memory.dmp

        Filesize

        7.7MB

      • memory/1528-1-0x0000000000080000-0x00000000000FA000-memory.dmp

        Filesize

        488KB

      • memory/1528-17-0x00000000049B0000-0x00000000049BA000-memory.dmp

        Filesize

        40KB

      • memory/1528-19-0x0000000004AA0000-0x0000000004B32000-memory.dmp

        Filesize

        584KB

      • memory/1528-20-0x0000000005000000-0x0000000005060000-memory.dmp

        Filesize

        384KB

      • memory/1528-21-0x0000000004A90000-0x0000000004A9C000-memory.dmp

        Filesize

        48KB

      • memory/1528-24-0x0000000005060000-0x00000000050B6000-memory.dmp

        Filesize

        344KB

      • memory/1528-0-0x00000000749FE000-0x00000000749FF000-memory.dmp

        Filesize

        4KB

      • memory/1528-5-0x00000000749F0000-0x00000000751A0000-memory.dmp

        Filesize

        7.7MB

      • memory/4704-29-0x00000000749F0000-0x00000000751A0000-memory.dmp

        Filesize

        7.7MB

      • memory/4704-26-0x0000000000400000-0x0000000000456000-memory.dmp

        Filesize

        344KB

      • memory/4704-31-0x00000000749F0000-0x00000000751A0000-memory.dmp

        Filesize

        7.7MB

      • memory/4704-30-0x0000000005760000-0x0000000005770000-memory.dmp

        Filesize

        64KB

      • memory/4704-32-0x0000000005A00000-0x0000000005AAE000-memory.dmp

        Filesize

        696KB

      • memory/4704-33-0x0000000005860000-0x0000000005888000-memory.dmp

        Filesize

        160KB

      • memory/4704-34-0x00000000063A0000-0x0000000006944000-memory.dmp

        Filesize

        5.6MB

      • memory/4704-35-0x00000000069C0000-0x0000000006A26000-memory.dmp

        Filesize

        408KB

      • memory/4704-36-0x0000000006FE0000-0x0000000006FF8000-memory.dmp

        Filesize

        96KB

      • memory/4704-37-0x0000000007010000-0x0000000007026000-memory.dmp

        Filesize

        88KB

      • memory/4704-38-0x0000000007200000-0x000000000720A000-memory.dmp

        Filesize

        40KB

      • memory/4704-44-0x00000000749F0000-0x00000000751A0000-memory.dmp

        Filesize

        7.7MB

      • memory/4704-45-0x00000000749F0000-0x00000000751A0000-memory.dmp

        Filesize

        7.7MB