Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2024 07:59

General

  • Target

    f7eb9a41fb41fa7e5b992a75879c71e7_JaffaCakes118.exe

  • Size

    718KB

  • MD5

    f7eb9a41fb41fa7e5b992a75879c71e7

  • SHA1

    322aeec3f69febacb5a5094606e854fd61b08e3b

  • SHA256

    c430529936d9ff03e632a56933e83da71892dcf5679183c36e67713113968cd1

  • SHA512

    cbc3642352f71d17e031cfb898949eff34cc549fc9688318fc25ee583d2af6dee8f520c0dfb0266dd6ce368d2ca2af0d5e3427999815bf4326737e79252e93ed

  • SSDEEP

    12288:7KlvNdLZmmFXJ7rq8ABnpGxEoiZO+0pNrI6md1AxL4316iX5jQyUDpKRe:uA4rSn8H+070t1CK1hq9DpKA

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2848
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_JaffaCakes118.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2584
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:2028

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118\f7eb9a41fb41fa7e5b992a75879c71e7_jaffacakes118.exe

      Filesize

      718KB

      MD5

      f7eb9a41fb41fa7e5b992a75879c71e7

      SHA1

      322aeec3f69febacb5a5094606e854fd61b08e3b

      SHA256

      c430529936d9ff03e632a56933e83da71892dcf5679183c36e67713113968cd1

      SHA512

      cbc3642352f71d17e031cfb898949eff34cc549fc9688318fc25ee583d2af6dee8f520c0dfb0266dd6ce368d2ca2af0d5e3427999815bf4326737e79252e93ed

    • C:\Users\Admin\AppData\Roaming\Imminent\Path.dat

      Filesize

      58B

      MD5

      cce5fdee46439eb83489486f1199b9c0

      SHA1

      d2695517f8d3ee98993ced98cb44e320b2225827

      SHA256

      258bf6459dcc89f7acd746510a5adcaa04e292e0c34043ceb61bac132f82521f

      SHA512

      5dfbcf89af802749dcb6e7592ab1d6accf835c6a6f878767ab2b0c56958be6359dc88bb4a8d3ca0039d7367d7e3ecb3f456651ec3a4a0bd23877bd1bf487af05

    • memory/2012-26-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2012-14-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2012-16-0x00000000004B0000-0x00000000004D8000-memory.dmp

      Filesize

      160KB

    • memory/2012-12-0x00000000003F0000-0x0000000000400000-memory.dmp

      Filesize

      64KB

    • memory/2012-13-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2012-7-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/2012-9-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/2012-11-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/2012-15-0x0000000004740000-0x00000000047EE000-memory.dmp

      Filesize

      696KB

    • memory/2332-4-0x00000000745DE000-0x00000000745DF000-memory.dmp

      Filesize

      4KB

    • memory/2332-1-0x0000000000FB0000-0x000000000106A000-memory.dmp

      Filesize

      744KB

    • memory/2332-3-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2332-6-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2332-17-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2332-2-0x00000000003A0000-0x00000000003BE000-memory.dmp

      Filesize

      120KB

    • memory/2332-0-0x00000000745DE000-0x00000000745DF000-memory.dmp

      Filesize

      4KB

    • memory/2332-5-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2700-25-0x00000000003D0000-0x000000000048A000-memory.dmp

      Filesize

      744KB

    • memory/2848-36-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/2848-33-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/2848-29-0x0000000000080000-0x00000000000D6000-memory.dmp

      Filesize

      344KB

    • memory/2848-39-0x0000000001EC0000-0x0000000001ED6000-memory.dmp

      Filesize

      88KB