Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 05:47

General

  • Target

    JaffaCakes118_dc6ffba989979aff1a6242359963248e.exe

  • Size

    1.3MB

  • MD5

    dc6ffba989979aff1a6242359963248e

  • SHA1

    97c4ec8b12e3aa4c30bd0df20c4ac5121c535cc5

  • SHA256

    aa42ba7735cc340298ab19cb7f4d16be8c66eafc12ffeda257cfbe5931957d92

  • SHA512

    7996d8b0c90b23cb81c2ed7a097107db6f40287e7f783d705fea603d51254315492532c7c50f26fc13ec000fdc66cad7dc2dc4dd7ee71fbe54d3bce0ed64a42b

  • SSDEEP

    24576:9Cdxte/80jYLT3U1jfsWaqihhlzhThJK+PP1G9iVjLGR3Q:Uw80cTsjkWaqky6xV+u

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Imminent family
  • Drops startup file 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • Drops file in Windows directory 3 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc6ffba989979aff1a6242359963248e.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc6ffba989979aff1a6242359963248e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c Copy C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc6ffba989979aff1a6242359963248e.exe "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\Logen.exe"
      2⤵
      • Drops startup file
      • System Location Discovery: System Language Discovery
      PID:2916
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5064
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4808
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5040
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3184
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4268
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5036
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4956
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4868
    • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
      "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
      2⤵
        PID:4480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 80
          3⤵
          • Program crash
          PID:2288
      • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
        "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1980
      • C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE
        "C:\Windows\MICROSOFT.NET\FRAMEWORK\V2.0.50727\MSBUILD.EXE"
        2⤵
          PID:2852
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 80
            3⤵
            • Program crash
            PID:1192
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2852 -ip 2852
        1⤵
          PID:3968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4480 -ip 4480
          1⤵
            PID:1172
          • C:\Windows\system32\wbem\WmiApSrv.exe
            C:\Windows\system32\wbem\WmiApSrv.exe
            1⤵
              PID:5072

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\MSBUILD.EXE.log

              Filesize

              319B

              MD5

              c0ed926cd0e608944ad99322aaedb97a

              SHA1

              007e5bc9d8650a46f48f75045034702c24be39c5

              SHA256

              eb035294fbea39baa6e6c65cb7e06451987c51c5536586f23de5dc7f91096943

              SHA512

              83891a4984208720a224937101313759ffec75f5ebb2225c30555e5a28c7cc753162d802b176694ecc7404e2723f75d86d313adb835d4ec826ac13ff24cce42a

            • memory/4808-19-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/4808-8-0x0000000074272000-0x0000000074273000-memory.dmp

              Filesize

              4KB

            • memory/4808-24-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/4808-12-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/5040-14-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/5040-17-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/5040-13-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/5040-37-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/5064-5-0x0000000000400000-0x0000000000456000-memory.dmp

              Filesize

              344KB

            • memory/5064-18-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/5064-10-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/5064-23-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB

            • memory/5064-9-0x0000000074270000-0x0000000074821000-memory.dmp

              Filesize

              5.7MB