Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 13:27

General

  • Target

    ebb846d7b9caee805a5104a086e57a35_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    ebb846d7b9caee805a5104a086e57a35

  • SHA1

    534d5bd0e9752416aee858c6df1cdc580fcdd657

  • SHA256

    2d8de32e24a97b04b486cdd19c445a78baba0d56d8990bc990f990a5a0311a1d

  • SHA512

    f4a42bcc06c3027f15736a921e0b2c554554e29153528cc7965840b1519ae81509b03c7ac6e74c5c1ea89ac0f21494902efc881bfc8289ac33e9b3f588a918dd

  • SSDEEP

    12288:/QjJNQK23cZDLIW9563iA9CnXwvqUUetMTeY6guOI3DlqTn+h7XyoxIqk0KOKMUD:/AjFiF9KyU5TqFMSdWQATMhwu+3CLwh

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Imminent family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebb846d7b9caee805a5104a086e57a35_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebb846d7b9caee805a5104a086e57a35_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3908-0-0x00000000755A2000-0x00000000755A3000-memory.dmp

    Filesize

    4KB

  • memory/3908-1-0x00000000755A0000-0x0000000075B51000-memory.dmp

    Filesize

    5.7MB

  • memory/3908-2-0x00000000755A0000-0x0000000075B51000-memory.dmp

    Filesize

    5.7MB

  • memory/3908-7-0x00000000755A2000-0x00000000755A3000-memory.dmp

    Filesize

    4KB

  • memory/3908-8-0x00000000755A0000-0x0000000075B51000-memory.dmp

    Filesize

    5.7MB

  • memory/3908-9-0x00000000755A0000-0x0000000075B51000-memory.dmp

    Filesize

    5.7MB