Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 19:54

General

  • Target

    JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe

  • Size

    747KB

  • MD5

    60597829cac84b6e44e6b5608bad1e90

  • SHA1

    45d990dc27a24806a5358b5aa99bf0f6e34bd230

  • SHA256

    ee4fad528992868087d6842e08ee1cf51b6e40f27d5d7a663dbb639ad94f8f95

  • SHA512

    2c99cdab0c6935337ae3fe8db16d45ee071b84bc30421c19cdf187d139272cb57d8c36d6af791ed2c414775d4554007a21d1d8347095477c9c67cc1f3ca7cf79

  • SSDEEP

    12288:8YdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzagMG:HdNikfu2hBfK8ilRty5olGJsxNMG

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Flawedammyy family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2944
  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe" -service -lunch
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AMMYY\hr

    Filesize

    22B

    MD5

    9f38364d2b1855d6b547da185d86f493

    SHA1

    30188f968a762f8a128cafb271ee487c2055d273

    SHA256

    118c46da26cad218ee1f41536d106d121195b4d065710b9694ba70ae7c5bddf0

    SHA512

    9b7318c6e4ae94a3c28c5eec35e1961cf12164b2550f940a33d1775e530bdb9ee5a6f4be1fcbfdd3cc64bbf3ac9ae400fc2aff60b9d39e19686e513921a151a0

  • C:\ProgramData\AMMYY\hr3

    Filesize

    68B

    MD5

    b95198fcf49254f90c6f0b12ddf3d7ee

    SHA1

    451d1e6373befd16ec77a884eb7355739be15347

    SHA256

    10a7f26ccee965b92155df117df0237523dc895d7e904398973d87a2d98e2151

    SHA512

    638d9a81ceb55e8bd554094947c74e599c78dbf032fd738214882e8c4eb66cb3fdc1b4e956d657e222cc7241e93be86029b56a88e3d3d79bef9a3213e90e2b02

  • C:\ProgramData\AMMYY\settings3.bin

    Filesize

    271B

    MD5

    4cb889e527b0d0781a17f6c2dd968129

    SHA1

    6a6a55cd5604370660f1c1ad1025195169be8978

    SHA256

    2658cd46dd49335e739cafa31ff2ec63f3315b65ecc171a0f7612713d3ac702b

    SHA512

    297d2c05d2ac950faeb519d3e7bc56ea9d9fcab65b5dfdbba2720be8eddc8b2d5ead3dc7c122b82d6937be6c2d7bb88872dd7b80961138571245fba381daac3f