Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 22:17

General

  • Target

    03c0158479dc2353ce33cd0b1ae14ce4_JaffaCakes118.exe

  • Size

    799KB

  • MD5

    03c0158479dc2353ce33cd0b1ae14ce4

  • SHA1

    89702438246caa63aefdfd7b589c25bfe6e893c0

  • SHA256

    546b8ec7e53888efcb62641c0c314d43e263b4180e4ad539bd36bc3e7657c1bb

  • SHA512

    11ef2e0dec41fb698a169bacb844d8efbd8477301a6c71576b493cd1c1bd865e75137b76088e4523c85173701dba29210cd0493b3d6f3c240b4ed8518a5e377d

  • SSDEEP

    24576:91bNWDNJ52BazRnbQSx4p+0/vzm0mTOwlqn7+LhS:9jW/5DxG3zOO57IS

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c0158479dc2353ce33cd0b1ae14ce4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03c0158479dc2353ce33cd0b1ae14ce4_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2184

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\idlj.exe
    Filesize

    111KB

    MD5

    5d451fef23e42c1e4dc7aa149f59df42

    SHA1

    6664bcdf072f48a00f5b5c14fad892609bd9fb72

    SHA256

    dd9fe5184e8cfdb9e38c5881e1d5dce645ed664dba82f5844b41995a9071d2e1

    SHA512

    314effe0d116bdbfeca629a52b1ee1d08992cd9e5d2e3aabd2bd20e603020af58f7de8ac269c5fe8a38918deb0254951d9eb65b94f363367a4850ab0eec85171

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe
    Filesize

    834KB

    MD5

    09b029e0cc99003c6c384a646904da05

    SHA1

    0525508ea6ee38eeeff9457b62f8c9a9efe4e6e3

    SHA256

    df87042009b45e213b29d095535b654f675667502086a8155d4279a35b166f61

    SHA512

    11af3cf9feb31014bf75872582a4cf3f6e51221ea9c7f166e2a8311b53fd60f29a563199479ac0dfdf11c9c1dd37713681c1b053eb232babbb7f48e0ade58fdb

  • memory/2184-117-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-118-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-113-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-114-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-115-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-116-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-35-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-112-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-119-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-120-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-121-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-122-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-123-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2184-124-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB