Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2025, 14:13

General

  • Target

    JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe

  • Size

    700KB

  • MD5

    aeb2b92aa0b59fb81871573cc24e5298

  • SHA1

    d4534643ca570a43459638bd36e6281802dfa459

  • SHA256

    22e5ba85e12a046aa53dd32213edf7e8ae8ba32360edd0064e5d8a3f866d0894

  • SHA512

    d9fd5544e32f068ad1ae6ded12e72243d92419efbec290cb342b9ddf9a72563962fdc4faa60a7aa3e22a3034327096525e5aafcf448da4df5e485abf0b62a6af

  • SSDEEP

    12288:1hjun1eaHjs7C8la0n9lp9Dkb1RtgA93ykM+TZtC3pge:DqeOs7C840n9lpG1Rtb93IKZtze

Malware Config

Signatures

  • FlawedAmmyy RAT

    Remote-access trojan based on leaked code for the Ammyy remote admin software.

  • Flawedammyy family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:460
  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe" -service -lunch
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aeb2b92aa0b59fb81871573cc24e5298.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:312

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AMMYY\hr

    Filesize

    22B

    MD5

    3e4ed9c07eb5faf2c4b6f8bacf807831

    SHA1

    3276c84e2ecc8c3a225843ad0206d0acb04992b2

    SHA256

    2246902d68719c15770b60611723aac85b07a8fe14e9a11f5175d4753287b528

    SHA512

    99afbfc843880703b746515bc48964f4cd5624ec2683749ae95229a109fabcece9d9f561de5dc0e5fe0d37e0dbe832690754030607df6c16ad723b0021953fc1

  • C:\ProgramData\AMMYY\hr3

    Filesize

    75B

    MD5

    6e91a855b6c04cae0955ad545bce9f94

    SHA1

    09682d3862451f509ddd32ffbf4e0d5956d42fe6

    SHA256

    c669a2091cb533e8ed89f88a486f1d0c3413ef811e47101af369490835eb2a9b

    SHA512

    bc058f315af44cfd060a4b12cf04a3598519b3d2a35f72ae613d762398123c79da6a41a0bef419eb76abd94b418aae79a027b20e13dee96df7a64d3e3aa574a6

  • C:\ProgramData\AMMYY\settings3.bin

    Filesize

    281B

    MD5

    7f1645a45e464cb0be413ff83c481368

    SHA1

    9a1ad9ec48093dea33127c094c7158e006393119

    SHA256

    90dda9899bf36707db3e2b025a6fdab985bdf9ff21f907fb873e858b0b9e3f58

    SHA512

    e4a866f104e7cb2e50825b2d3925a066695b02d5dc2c8a878c62a6d33860104e75de2ccd1a485341d8b84b058245ba4c285c5233ea366e3d60afdfd5b31499f1