Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2024 22:22

General

  • Target

    b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe

  • Size

    740KB

  • MD5

    b3cd481ab5d2cba65b0318df5a6ed582

  • SHA1

    2e04afbbf9e4cbaabd3fab2c6a35d8885229d74c

  • SHA256

    47fc82320114cf2d2536acb931dc4dd8f83237b344b130780752c705af1a0e61

  • SHA512

    45278999127ded36b05e0027a61036cf465233d918471694f570a61ae93367e1c7af3ca3f201c6bc9a958ee65fcacf83fd864e0f623f1fd4625d4ea8b3458bd3

  • SSDEEP

    12288:1UYpJqMH2OwlaUPcWWw5XZV8f64RteVpN5ETMasTjsgvP34:tpJJWOwlaUPcWWwRZb4Rt+N5WMasHh4

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Flawedammyy family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2512
  • C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe" -service -lunch
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b3cd481ab5d2cba65b0318df5a6ed582_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AMMYY\hr

    Filesize

    22B

    MD5

    79d9d8ed1e636584bf1bc77b90e6d070

    SHA1

    d440fe40c0d8f9815f6a336b7195b73e477f5ca9

    SHA256

    33d637faaaa8dd224251089f8fde5549948430037a365a89c1250ceec7a8c38d

    SHA512

    b9f9c87ac753d5e8a990116d002efa7f75a387dece0f1286d359348039c307fc43c770e4bc361ac8f1ce047fb9a2861f7aee9d826b520e9ca2746af7a20e15e8

  • C:\ProgramData\AMMYY\hr3

    Filesize

    75B

    MD5

    928aa062b4ef5f6805f93b51a6a111ae

    SHA1

    d7b19a9c6d109e7e0539f3f9e4847723c363e4f1

    SHA256

    87078723147b0d25f6343e86b0fc30d1c9e219640fb5279214cd94c4b6722681

    SHA512

    a904aeac60844e53e914afbbb1494aa1c0009fb71c92ede567f33c99bf980040aea36243fece4fcae3e9fa70781084e785c93a2e688260b56f59b289252b1988

  • C:\ProgramData\AMMYY\settings3.bin

    Filesize

    283B

    MD5

    c4f363e5d5033a0ba0209333d56c4bff

    SHA1

    954dc745edf1e351bc233eebbe5a1c640d6ab92b

    SHA256

    47a20a1e931485993579d3fb6f7f7389bcefc99c0354fcd3a76d42e564ab8882

    SHA512

    35c0e50a3854fe5ee87699587ce9d6dac9581f8031ccfad9ecdedc220fdf8378926104c7a3579420d1fd2c0b1d5c651b322d53d27189608ef76c3c54bde3a69f