Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 19:54

General

  • Target

    JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe

  • Size

    747KB

  • MD5

    60597829cac84b6e44e6b5608bad1e90

  • SHA1

    45d990dc27a24806a5358b5aa99bf0f6e34bd230

  • SHA256

    ee4fad528992868087d6842e08ee1cf51b6e40f27d5d7a663dbb639ad94f8f95

  • SHA512

    2c99cdab0c6935337ae3fe8db16d45ee071b84bc30421c19cdf187d139272cb57d8c36d6af791ed2c414775d4554007a21d1d8347095477c9c67cc1f3ca7cf79

  • SSDEEP

    12288:8YdNctvsfu2LVBfKf057C9lRt3i5olGJsxhzagMG:HdNikfu2hBfK8ilRty5olGJsxNMG

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Flawedammyy family
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4936
  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe" -service -lunch
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60597829cac84b6e44e6b5608bad1e90.exe"
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AMMYY\hr

    Filesize

    22B

    MD5

    ae834f3678084f5a0d3114bf1f5f2cbe

    SHA1

    c15452798e3e2170b4a69018667b355790fc5afd

    SHA256

    248dd3a6ea4312691bcbe8bbe9dde60d0478f43ec178361d9e3f9cc0b651f505

    SHA512

    90d35bbb3ad30183dfe1605313932423964bce45ea868167f92af0daa537726fba0757dbd86cdb028319a046bd6b25de22fb91a2cd245557d6df4254cba694ed

  • C:\ProgramData\AMMYY\hr3

    Filesize

    75B

    MD5

    e1b0c0852fc033c0133574035b24ceba

    SHA1

    048bd27248dc8e0ecea3fef435123dfb22de2ad3

    SHA256

    079b5ce8412948968a16c37a17546712ecbd2133cef71f68fe739f9cb9521d76

    SHA512

    1c1381b6ca89bf3a1819ec8a737a7c90dcb2ca06a274434aa527f5aeab5d323da2e860bc973347a0ac37386ce3da8914c979061ac3b71f4e3af740482df7d548

  • C:\ProgramData\AMMYY\settings3.bin

    Filesize

    271B

    MD5

    4cb889e527b0d0781a17f6c2dd968129

    SHA1

    6a6a55cd5604370660f1c1ad1025195169be8978

    SHA256

    2658cd46dd49335e739cafa31ff2ec63f3315b65ecc171a0f7612713d3ac702b

    SHA512

    297d2c05d2ac950faeb519d3e7bc56ea9d9fcab65b5dfdbba2720be8eddc8b2d5ead3dc7c122b82d6937be6c2d7bb88872dd7b80961138571245fba381daac3f