Analysis Overview
SHA256
0c43c680809d5cc9cbf4bf7c78e086879f7820875e4af5374befd082b5424430
Threat Level: Known bad
The file e61079bd50eec82addf0a77218497655_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Modifies WinLogon for persistence
Suspicious use of SetThreadContext
Drops file in System32 directory
Program crash
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-07 23:05
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-07 23:05
Reported
2024-04-07 23:08
Platform
win7-20240220-en
Max time kernel
140s
Max time network
121s
Command Line
Signatures
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1976 set thread context of 2740 | N/A | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 128
Network
Files
memory/2740-0-0x0000000000400000-0x0000000000419000-memory.dmp
memory/2740-2-0x0000000000400000-0x0000000000419000-memory.dmp
memory/2740-4-0x0000000000400000-0x0000000000419000-memory.dmp
memory/2740-7-0x0000000000400000-0x0000000000419000-memory.dmp
memory/2740-10-0x0000000000400000-0x0000000000419000-memory.dmp
memory/2740-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2740-15-0x0000000000400000-0x0000000000419000-memory.dmp
memory/1976-14-0x0000000000400000-0x000000000041E000-memory.dmp
memory/2740-18-0x0000000000400000-0x0000000000419000-memory.dmp
memory/2740-17-0x0000000000220000-0x0000000000233000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-07 23:05
Reported
2024-04-07 23:08
Platform
win10v2004-20240226-en
Max time kernel
162s
Max time network
165s
Command Line
Signatures
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\sdra64.exe," | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\sdra64.exe | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | N/A |
| File created | C:\Windows\SysWOW64\sdra64.exe | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1272 set thread context of 380 | N/A | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\winlogon.exe
winlogon.exe
C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"
C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\e61079bd50eec82addf0a77218497655_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 121.118.77.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.16.208.104.in-addr.arpa | udp |
Files
memory/380-0-0x0000000000400000-0x0000000000419000-memory.dmp
memory/380-1-0x0000000000400000-0x0000000000419000-memory.dmp
memory/380-2-0x0000000000400000-0x0000000000419000-memory.dmp
memory/1272-4-0x0000000000400000-0x000000000041E000-memory.dmp
memory/380-5-0x0000000000400000-0x0000000000419000-memory.dmp
memory/380-7-0x00000000009C0000-0x00000000009D3000-memory.dmp
memory/380-8-0x0000000000400000-0x0000000000419000-memory.dmp
memory/624-17-0x0000000000400000-0x0000000000419000-memory.dmp
memory/624-22-0x0000000031710000-0x0000000031729000-memory.dmp
memory/624-27-0x0000000031730000-0x0000000031749000-memory.dmp
memory/624-32-0x0000000031750000-0x0000000031769000-memory.dmp
memory/624-37-0x0000000031770000-0x0000000031789000-memory.dmp
memory/624-42-0x0000000031790000-0x00000000317A9000-memory.dmp
memory/624-47-0x00000000317B0000-0x00000000317C9000-memory.dmp
memory/624-52-0x00000000317D0000-0x00000000317E9000-memory.dmp
memory/624-57-0x00000000317F0000-0x0000000031809000-memory.dmp
memory/624-62-0x0000000031810000-0x0000000031829000-memory.dmp
memory/624-67-0x0000000031830000-0x0000000031849000-memory.dmp
memory/624-72-0x0000000031850000-0x0000000031869000-memory.dmp
memory/624-77-0x0000000031870000-0x0000000031889000-memory.dmp
memory/624-82-0x0000000031890000-0x00000000318A9000-memory.dmp
memory/624-87-0x00000000318B0000-0x00000000318C9000-memory.dmp
memory/624-92-0x00000000318D0000-0x00000000318E9000-memory.dmp
memory/624-97-0x00000000318F0000-0x0000000031909000-memory.dmp
memory/624-102-0x0000000031910000-0x0000000031929000-memory.dmp
memory/624-107-0x0000000031930000-0x0000000031949000-memory.dmp
memory/624-112-0x0000000031950000-0x0000000031969000-memory.dmp
memory/624-117-0x0000000031970000-0x0000000031989000-memory.dmp
memory/624-122-0x0000000031990000-0x00000000319A9000-memory.dmp
memory/624-127-0x00000000319B0000-0x00000000319C9000-memory.dmp
memory/624-132-0x00000000319D0000-0x00000000319E9000-memory.dmp
memory/624-137-0x00000000319F0000-0x0000000031A09000-memory.dmp
memory/624-142-0x0000000031A10000-0x0000000031A29000-memory.dmp
memory/624-147-0x0000000031A30000-0x0000000031A49000-memory.dmp
memory/624-152-0x0000000031A50000-0x0000000031A69000-memory.dmp
memory/624-157-0x0000000031A70000-0x0000000031A89000-memory.dmp
memory/624-162-0x0000000031A90000-0x0000000031AA9000-memory.dmp
memory/624-167-0x0000000031AB0000-0x0000000031AC9000-memory.dmp
memory/624-172-0x0000000031AD0000-0x0000000031AE9000-memory.dmp
memory/624-177-0x0000000031AF0000-0x0000000031B09000-memory.dmp
memory/624-182-0x0000000031B10000-0x0000000031B29000-memory.dmp
memory/624-187-0x0000000031B30000-0x0000000031B49000-memory.dmp
memory/624-192-0x0000000031B50000-0x0000000031B69000-memory.dmp
memory/624-197-0x0000000031B70000-0x0000000031B89000-memory.dmp
memory/624-202-0x0000000031B90000-0x0000000031BA9000-memory.dmp
memory/624-207-0x0000000031BB0000-0x0000000031BC9000-memory.dmp
memory/624-212-0x0000000031BD0000-0x0000000031BE9000-memory.dmp
memory/624-217-0x0000000031BF0000-0x0000000031C09000-memory.dmp
memory/624-222-0x0000000031C10000-0x0000000031C29000-memory.dmp
memory/624-227-0x0000000031C30000-0x0000000031C49000-memory.dmp
memory/624-232-0x0000000031C50000-0x0000000031C69000-memory.dmp
memory/624-237-0x0000000031C70000-0x0000000031C89000-memory.dmp
memory/624-242-0x0000000031C90000-0x0000000031CA9000-memory.dmp
memory/624-247-0x0000000031CB0000-0x0000000031CC9000-memory.dmp
memory/624-252-0x0000000031CD0000-0x0000000031CE9000-memory.dmp
memory/624-257-0x0000000031CF0000-0x0000000031D09000-memory.dmp
memory/624-262-0x0000000031D10000-0x0000000031D29000-memory.dmp
memory/624-267-0x0000000031D30000-0x0000000031D49000-memory.dmp
memory/624-272-0x0000000031D50000-0x0000000031D69000-memory.dmp
memory/624-277-0x0000000031D70000-0x0000000031D89000-memory.dmp
memory/624-282-0x0000000031D90000-0x0000000031DA9000-memory.dmp
memory/624-287-0x0000000031DB0000-0x0000000031DC9000-memory.dmp
memory/624-292-0x0000000031DD0000-0x0000000031DE9000-memory.dmp
memory/624-297-0x0000000031DF0000-0x0000000031E09000-memory.dmp
memory/380-3270-0x0000000000400000-0x0000000000419000-memory.dmp