Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 16:42

General

  • Target

    e98c16cc48588fffc177f1643bd8f285_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    e98c16cc48588fffc177f1643bd8f285

  • SHA1

    f98d5953c1fd8c2edefb73705af9ae68826b8e3e

  • SHA256

    c8f4215c2f4fd603d7051c110d956c5b03548d6c4a660bc96b0008d552d50a49

  • SHA512

    d2d3fe0a7d213e1231765cf6e3b773c7b8fd727df5938d62b6aa5a604a8a35cf7dd6fc926ce9879b7f21657f8ee38ce7b299607e91132c5e2b7e4a6608a35fff

  • SSDEEP

    24576:5RmJkqoQrilOIQ+yMxGafZW+f5guBG3fFi:uJXoQryTiMxGafZWmzBoi

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e98c16cc48588fffc177f1643bd8f285_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e98c16cc48588fffc177f1643bd8f285_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dKFc.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4160
      • C:\Users\Admin\AppData\Roaming\OGKLZGTf\giSmOuRH.exe
        "C:\Users\Admin\AppData\Roaming\OGKLZGTf\giSmOuRH.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:392
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"
      2⤵
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\Taskmgr.exe
        "C:\Windows\System32\Taskmgr.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dKFc.vbs

    Filesize

    554B

    MD5

    8840af0ba0ef487ee3b2716f3089e012

    SHA1

    a988fb886eb565c77c787552632c90f7a0458c37

    SHA256

    ccc72f763c8ecc755fe4bbc2b2646dc273c36cfe15a2cc7693e1bd55e7e32910

    SHA512

    c451159869bd4b2020bc44670189cca92eb2cc8580cca642807b178f791958aa04958d9b0bdc5ba5bc124d0a70c43da14b1c9c41e327a627a0a182b8655fb616

  • C:\Users\Admin\AppData\Roaming\OGKLZGTf\giSmOuRH.exe

    Filesize

    1.1MB

    MD5

    e98c16cc48588fffc177f1643bd8f285

    SHA1

    f98d5953c1fd8c2edefb73705af9ae68826b8e3e

    SHA256

    c8f4215c2f4fd603d7051c110d956c5b03548d6c4a660bc96b0008d552d50a49

    SHA512

    d2d3fe0a7d213e1231765cf6e3b773c7b8fd727df5938d62b6aa5a604a8a35cf7dd6fc926ce9879b7f21657f8ee38ce7b299607e91132c5e2b7e4a6608a35fff

  • memory/1468-5-0x0000000005400000-0x0000000005401000-memory.dmp

    Filesize

    4KB

  • memory/1704-6-0x0000000000400000-0x0000000000452000-memory.dmp

    Filesize

    328KB

  • memory/1704-12-0x0000000072902000-0x0000000072903000-memory.dmp

    Filesize

    4KB

  • memory/1704-14-0x0000000072900000-0x0000000072EB1000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-15-0x0000000072900000-0x0000000072EB1000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-36-0x0000000072900000-0x0000000072EB1000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-35-0x0000000072900000-0x0000000072EB1000-memory.dmp

    Filesize

    5.7MB

  • memory/1704-34-0x0000000072902000-0x0000000072903000-memory.dmp

    Filesize

    4KB

  • memory/3268-31-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-30-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-29-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-28-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-27-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-26-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-25-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-20-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-21-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB

  • memory/3268-19-0x0000000008280000-0x0000000008281000-memory.dmp

    Filesize

    4KB