Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 19:54
Behavioral task
behavioral1
Sample
JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
-
Size
747KB
-
MD5
60597829cac84b6e44e6b5608bad1e90
-
SHA1
45d990dc27a24806a5358b5aa99bf0f6e34bd230
-
SHA256
ee4fad528992868087d6842e08ee1cf51b6e40f27d5d7a663dbb639ad94f8f95
-
SHA512
2c99cdab0c6935337ae3fe8db16d45ee071b84bc30421c19cdf187d139272cb57d8c36d6af791ed2c414775d4554007a21d1d8347095477c9c67cc1f3ca7cf79
-
SSDEEP
12288:8YdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzagMG:HdNikfu2hBfK8ilRty5olGJsxNMG
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\International\Geo\Nation JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr = 537d567366087c695f594c165453078df9dbce03b36b JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr3 = c3981f6642f6dfd382e6f6f1e78adb984aa14c1adb8dbdb34718a6f162586332a26f4fb0917f6e7472d0095a844de98d909f3c3056165cee23b43f818881cd70da70980a JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2440 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2440 2488 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe 32 PID 2488 wrote to memory of 2440 2488 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe 32 PID 2488 wrote to memory of 2440 2488 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe 32 PID 2488 wrote to memory of 2440 2488 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2944
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD59f38364d2b1855d6b547da185d86f493
SHA130188f968a762f8a128cafb271ee487c2055d273
SHA256118c46da26cad218ee1f41536d106d121195b4d065710b9694ba70ae7c5bddf0
SHA5129b7318c6e4ae94a3c28c5eec35e1961cf12164b2550f940a33d1775e530bdb9ee5a6f4be1fcbfdd3cc64bbf3ac9ae400fc2aff60b9d39e19686e513921a151a0
-
Filesize
68B
MD5b95198fcf49254f90c6f0b12ddf3d7ee
SHA1451d1e6373befd16ec77a884eb7355739be15347
SHA25610a7f26ccee965b92155df117df0237523dc895d7e904398973d87a2d98e2151
SHA512638d9a81ceb55e8bd554094947c74e599c78dbf032fd738214882e8c4eb66cb3fdc1b4e956d657e222cc7241e93be86029b56a88e3d3d79bef9a3213e90e2b02
-
Filesize
271B
MD54cb889e527b0d0781a17f6c2dd968129
SHA16a6a55cd5604370660f1c1ad1025195169be8978
SHA2562658cd46dd49335e739cafa31ff2ec63f3315b65ecc171a0f7612713d3ac702b
SHA512297d2c05d2ac950faeb519d3e7bc56ea9d9fcab65b5dfdbba2720be8eddc8b2d5ead3dc7c122b82d6937be6c2d7bb88872dd7b80961138571245fba381daac3f