Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 14:13
Behavioral task
behavioral1
Sample
JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe
-
Size
700KB
-
MD5
aeb2b92aa0b59fb81871573cc24e5298
-
SHA1
d4534643ca570a43459638bd36e6281802dfa459
-
SHA256
22e5ba85e12a046aa53dd32213edf7e8ae8ba32360edd0064e5d8a3f866d0894
-
SHA512
d9fd5544e32f068ad1ae6ded12e72243d92419efbec290cb342b9ddf9a72563962fdc4faa60a7aa3e22a3034327096525e5aafcf448da4df5e485abf0b62a6af
-
SSDEEP
12288:1hjun1eaHjs7C8la0n9lp9Dkb1RtgA93ykM+TZtC3pge:DqeOs7C840n9lpG1Rtb93IKZtze
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr = 537d567366087c6658524c1752534d6073d8a3f5b36b JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = 920e1688c4cf3298ec6359d41adc9589d6b32194d25c5ecb156d4bd12ef091531820af45839beaa39e7b8544c33fcb89cefbe6378d9f0d780b6588cb9df25ad34360ae0666e34fb27c92c3 JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 312 JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 312 JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 312 4932 JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe 87 PID 4932 wrote to memory of 312 4932 JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe 87 PID 4932 wrote to memory of 312 4932 JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe"1⤵
- System Location Discovery: System Language Discovery
PID:460
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:312
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD53e4ed9c07eb5faf2c4b6f8bacf807831
SHA13276c84e2ecc8c3a225843ad0206d0acb04992b2
SHA2562246902d68719c15770b60611723aac85b07a8fe14e9a11f5175d4753287b528
SHA51299afbfc843880703b746515bc48964f4cd5624ec2683749ae95229a109fabcece9d9f561de5dc0e5fe0d37e0dbe832690754030607df6c16ad723b0021953fc1
-
Filesize
75B
MD56e91a855b6c04cae0955ad545bce9f94
SHA109682d3862451f509ddd32ffbf4e0d5956d42fe6
SHA256c669a2091cb533e8ed89f88a486f1d0c3413ef811e47101af369490835eb2a9b
SHA512bc058f315af44cfd060a4b12cf04a3598519b3d2a35f72ae613d762398123c79da6a41a0bef419eb76abd94b418aae79a027b20e13dee96df7a64d3e3aa574a6
-
Filesize
281B
MD57f1645a45e464cb0be413ff83c481368
SHA19a1ad9ec48093dea33127c094c7158e006393119
SHA25690dda9899bf36707db3e2b025a6fdab985bdf9ff21f907fb873e858b0b9e3f58
SHA512e4a866f104e7cb2e50825b2d3925a066695b02d5dc2c8a878c62a6d33860104e75de2ccd1a485341d8b84b058245ba4c285c5233ea366e3d60afdfd5b31499f1