Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 18:07

General

  • Target

    JaffaCakes118_53126310b9e5a75cdc27768b2e79c49a.exe

  • Size

    712KB

  • MD5

    53126310b9e5a75cdc27768b2e79c49a

  • SHA1

    89d758296729da08b468e545299ec0106309f7d1

  • SHA256

    08916dcbb2ac3443429f3426caaedc77a8ebc30417428266434ab108bb808c15

  • SHA512

    c2bbac5900278feab83341896fad70ba8c9c648ba8a0c5f418481f57d4b641c381ccc0eed732a9d60ffb67a95b2c3478624072b19bbc9080e7f7660fad0fc1c4

  • SSDEEP

    12288:HKHp9fDIItMm2o44sGTdBqWvwD+8ChCbW3XTjY1r1RtH8ePhAU5u0AhpZxAhegl:HorLkbDEhyW3XS1RtcePKUBATZxul

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Flawedammyy family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53126310b9e5a75cdc27768b2e79c49a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53126310b9e5a75cdc27768b2e79c49a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2376
  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53126310b9e5a75cdc27768b2e79c49a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53126310b9e5a75cdc27768b2e79c49a.exe" -service -lunch
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53126310b9e5a75cdc27768b2e79c49a.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53126310b9e5a75cdc27768b2e79c49a.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AMMYY\hr

    Filesize

    22B

    MD5

    3e5b75b1e41981c6e3a64e9b831bc18b

    SHA1

    504f2ba8438767b0f8b0875854c0a616a15e5e4c

    SHA256

    0dbe1d223ad52d06385ff02409cab2f1d211bab8be71981fe8cacae2272b9d27

    SHA512

    4172a0453b76c626b0b68839820a4cf126a25367249147a084f877d62febbcbb69356b1dcb1c2ab1486fc50543c81470370e29f5797bbbe668bc03a75030d4cb

  • C:\ProgramData\AMMYY\hr3

    Filesize

    75B

    MD5

    d810af43a5c649fb82bdbe8456ccaa67

    SHA1

    83cb282dbbda4f1dccf0dfd6dd5b31a9665e3074

    SHA256

    1f62f3f7016e20297940bb6d66efe5069ce05ea3035722fc8a0de0cf956d772e

    SHA512

    630f08edaa79e7f0c932c43b8e7e3531f4c3025fe09153e7d088c1ec77e4fda7a1197dfca9c44cce60b89b391881534714dc0392cb57de6f82db93647510a263

  • C:\ProgramData\AMMYY\settings3.bin

    Filesize

    305B

    MD5

    ff581a784b674e06b6c7981319eb3cc7

    SHA1

    97209bac14a5f851464e78606ad0d2422c0bc48b

    SHA256

    09c62b32f52257d9e6f045391f6a140e06c66715b8d5b68a87ed9736b62499f5

    SHA512

    ca1276674e42d31b2936fddf0b85279102ec48d60e75e52eacfb930a203a18377c15e615a6eab0ffaaf5fb77f651641b9aa8fed2767352b45396a4064da7b7e9