Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 05:52

General

  • Target

    dbedd44f3539b4dd11f9d9b184d053c2_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    dbedd44f3539b4dd11f9d9b184d053c2

  • SHA1

    220b9dc0815ebeeaee9ade86f9e1b0e35113914d

  • SHA256

    c43541d5220c8987a9e4263bf945bfef11590b5627c3b5514e96452dc3271107

  • SHA512

    134d45ff728c1fc085e717bf7d58ea7bba9453c9a01433ea11b415a97d61ba6e55f38fa343865dfb79b18876d645628786879b6a67c62dda928821d9edb26e04

  • SSDEEP

    24576:gpugBnJmDdyLAmz1ImjXUDaP49IynuPKqx74KpK2Ci+:wBnyajjynuiqzo

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbedd44f3539b4dd11f9d9b184d053c2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbedd44f3539b4dd11f9d9b184d053c2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Users\Admin\AppData\Roaming\qOQiKCSVcNim.exe
      "C:\Users\Admin\AppData\Roaming\qOQiKCSVcNim.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1272
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /query
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1856
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /create /sc MINUTE /tn ipUOtq /MO 1 /tr "C:\ProgramData\Microsoft\execel.exe\
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:3440
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:4436

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

            Filesize

            50B

            MD5

            c7dc1c3dd6b3c7fda43f59e35c8e72af

            SHA1

            c9d90737dbb26589649d401cf216c092f2cec8e7

            SHA256

            12f13661d5cee757a6246e38e0d25ccb1d48f043ddb82c881f6762692858ccbb

            SHA512

            196afa55bf2b413dbebc9b7302a50fce8e50acf6f06e0c21b6525d0ee04e65d3735e18dff3d201e209ed9cb47d495dd9ffc780d8813b385f26811257ff86e667

          • C:\Users\Admin\AppData\Roaming\qOQiKCSVcNim.exe

            Filesize

            202KB

            MD5

            e67586b95de499a83461731bf43d38eb

            SHA1

            f9e335e7722dc1b22e81149c223e766e0ae36e24

            SHA256

            aa5d288a84e5979c5ee22332cb3050861f4458d012c954f77f7d1ae56fc402b5

            SHA512

            0f9b44ec8a7e10c5bc3be06da51cdb558d4ae7722c7292b12a6a6e46d6c1898d100a01b98f6764e811020df003aa274afa30131831526b3386515af658840946

          • memory/1272-25-0x00000000065A0000-0x00000000065A5000-memory.dmp

            Filesize

            20KB

          • memory/1272-26-0x00000000065E0000-0x00000000065E1000-memory.dmp

            Filesize

            4KB

          • memory/1272-47-0x0000000070A80000-0x0000000071031000-memory.dmp

            Filesize

            5.7MB

          • memory/1272-12-0x0000000070A82000-0x0000000070A83000-memory.dmp

            Filesize

            4KB

          • memory/1272-13-0x0000000070A80000-0x0000000071031000-memory.dmp

            Filesize

            5.7MB

          • memory/1272-14-0x0000000070A80000-0x0000000071031000-memory.dmp

            Filesize

            5.7MB

          • memory/1272-44-0x0000000070A80000-0x0000000071031000-memory.dmp

            Filesize

            5.7MB

          • memory/1272-43-0x0000000070A82000-0x0000000070A83000-memory.dmp

            Filesize

            4KB

          • memory/1272-23-0x00000000065A0000-0x00000000065A5000-memory.dmp

            Filesize

            20KB

          • memory/1272-24-0x00000000065A0000-0x00000000065A5000-memory.dmp

            Filesize

            20KB

          • memory/2032-19-0x0000000000400000-0x0000000000456000-memory.dmp

            Filesize

            344KB

          • memory/4304-0-0x0000000074B1E000-0x0000000074B1F000-memory.dmp

            Filesize

            4KB

          • memory/4304-3-0x0000000004B50000-0x0000000004B5C000-memory.dmp

            Filesize

            48KB

          • memory/4304-1-0x0000000000070000-0x0000000000218000-memory.dmp

            Filesize

            1.7MB

          • memory/4304-18-0x0000000005730000-0x00000000057CC000-memory.dmp

            Filesize

            624KB

          • memory/4304-17-0x00000000055C0000-0x0000000005616000-memory.dmp

            Filesize

            344KB

          • memory/4304-2-0x0000000002660000-0x00000000026F4000-memory.dmp

            Filesize

            592KB