Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 19:54
Behavioral task
behavioral1
Sample
JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
-
Size
747KB
-
MD5
60597829cac84b6e44e6b5608bad1e90
-
SHA1
45d990dc27a24806a5358b5aa99bf0f6e34bd230
-
SHA256
ee4fad528992868087d6842e08ee1cf51b6e40f27d5d7a663dbb639ad94f8f95
-
SHA512
2c99cdab0c6935337ae3fe8db16d45ee071b84bc30421c19cdf187d139272cb57d8c36d6af791ed2c414775d4554007a21d1d8347095477c9c67cc1f3ca7cf79
-
SSDEEP
12288:8YdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzagMG:HdNikfu2hBfK8ilRty5olGJsxNMG
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d567366087c6658524c175253927aecdace03b36b JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = 3891164c1df7377fad43bf60ffa9b59e9fe8c5cf49fdc8a7ed86974363c26dcfc33f0596e3dd408de4b0f011c839b06f167c74583869dba21b26c34a890479e8e841a2a77bbb6cac8806d9 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3964 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3964 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3964 3140 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe 84 PID 3140 wrote to memory of 3964 3140 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe 84 PID 3140 wrote to memory of 3964 3140 JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4936
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5ae834f3678084f5a0d3114bf1f5f2cbe
SHA1c15452798e3e2170b4a69018667b355790fc5afd
SHA256248dd3a6ea4312691bcbe8bbe9dde60d0478f43ec178361d9e3f9cc0b651f505
SHA51290d35bbb3ad30183dfe1605313932423964bce45ea868167f92af0daa537726fba0757dbd86cdb028319a046bd6b25de22fb91a2cd245557d6df4254cba694ed
-
Filesize
75B
MD5e1b0c0852fc033c0133574035b24ceba
SHA1048bd27248dc8e0ecea3fef435123dfb22de2ad3
SHA256079b5ce8412948968a16c37a17546712ecbd2133cef71f68fe739f9cb9521d76
SHA5121c1381b6ca89bf3a1819ec8a737a7c90dcb2ca06a274434aa527f5aeab5d323da2e860bc973347a0ac37386ce3da8914c979061ac3b71f4e3af740482df7d548
-
Filesize
271B
MD54cb889e527b0d0781a17f6c2dd968129
SHA16a6a55cd5604370660f1c1ad1025195169be8978
SHA2562658cd46dd49335e739cafa31ff2ec63f3315b65ecc171a0f7612713d3ac702b
SHA512297d2c05d2ac950faeb519d3e7bc56ea9d9fcab65b5dfdbba2720be8eddc8b2d5ead3dc7c122b82d6937be6c2d7bb88872dd7b80961138571245fba381daac3f