Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 22:22
Behavioral task
behavioral1
Sample
b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe
-
Size
740KB
-
MD5
b3cd481ab5d2cba65b0318df5a6ed582
-
SHA1
2e04afbbf9e4cbaabd3fab2c6a35d8885229d74c
-
SHA256
47fc82320114cf2d2536acb931dc4dd8f83237b344b130780752c705af1a0e61
-
SHA512
45278999127ded36b05e0027a61036cf465233d918471694f570a61ae93367e1c7af3ca3f201c6bc9a958ee65fcacf83fd864e0f623f1fd4625d4ea8b3458bd3
-
SSDEEP
12288:1UYpJqMH2OwlaUPcWWw5XZV8f64RteVpN5ETMasTjsgvP34:tpJJWOwlaUPcWWwRZb4Rt+N5WMasHh4
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\Geo\Nation b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr = 537d567366087c6658524c17525327248917e51db36b b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr3 = 335fcaa3bdcd80a9a18f4dcc8e237863b9cdc2556f3512968a3d12613e1064610bedb09442e7f366bfe37e5b17b3cd37407e570627eec590f9e6b4ca013fa9cecd5c90146af90a8ef29210 b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2072 b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2072 1628 b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2072 1628 b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2072 1628 b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe 31 PID 1628 wrote to memory of 2072 1628 b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2512
-
C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD579d9d8ed1e636584bf1bc77b90e6d070
SHA1d440fe40c0d8f9815f6a336b7195b73e477f5ca9
SHA25633d637faaaa8dd224251089f8fde5549948430037a365a89c1250ceec7a8c38d
SHA512b9f9c87ac753d5e8a990116d002efa7f75a387dece0f1286d359348039c307fc43c770e4bc361ac8f1ce047fb9a2861f7aee9d826b520e9ca2746af7a20e15e8
-
Filesize
75B
MD5928aa062b4ef5f6805f93b51a6a111ae
SHA1d7b19a9c6d109e7e0539f3f9e4847723c363e4f1
SHA25687078723147b0d25f6343e86b0fc30d1c9e219640fb5279214cd94c4b6722681
SHA512a904aeac60844e53e914afbbb1494aa1c0009fb71c92ede567f33c99bf980040aea36243fece4fcae3e9fa70781084e785c93a2e688260b56f59b289252b1988
-
Filesize
283B
MD5c4f363e5d5033a0ba0209333d56c4bff
SHA1954dc745edf1e351bc233eebbe5a1c640d6ab92b
SHA25647a20a1e931485993579d3fb6f7f7389bcefc99c0354fcd3a76d42e564ab8882
SHA51235c0e50a3854fe5ee87699587ce9d6dac9581f8031ccfad9ecdedc220fdf8378926104c7a3579420d1fd2c0b1d5c651b322d53d27189608ef76c3c54bde3a69f