Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 07:24

General

  • Target

    f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe

  • Size

    355KB

  • MD5

    f091715f041f72497b23d1f9d66e643f

  • SHA1

    54d4981feda40d38e730e0afa56160ab0d1809d7

  • SHA256

    b8efa8d1ada1cc82111e3623571fb53ddf709977c9c4c4773aeea323f4134676

  • SHA512

    fa179c24e2b6bd49374a28561424e2176a1e87317bbf10e723458791383454b773ec60586632b143d5169a14d1cb62f2bdfefe2db8478841e76e7e69945ecae0

  • SSDEEP

    6144:03EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:/mWhND9yJz+b1FcMLmp2ATTSsdS

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f091715f041f72497b23d1f9d66e643f_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Suspicious behavior: EnumeratesProcesses
      PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\830E.tmp

          Filesize

          22KB

          MD5

          65d65d06231ebbc742378d2eb715e403

          SHA1

          701782e7fe3ce4f6049009679558be571d33d23b

          SHA256

          0dafc6491d0779edd55149322b508a0be5fb16217f15e764f0e2cc2820bd803b

          SHA512

          0f7dd58eb525437f595e3e4f0e0e8c565db2cab3815604cc3b80ae2d90dbb6ac6fdf732c10defee465a3a96b74fedc2658c22760309eefce7f37a1915dd26e6a

        • C:\Users\Admin\AppData\Local\Temp\8F5B.tmp

          Filesize

          42KB

          MD5

          1b66f2caae2974046fbe430c5841f5cf

          SHA1

          095665890d30839792b8acf6db8e2a8fb8afdf85

          SHA256

          e521403abd37e9a2f949e166e24cdbb8c77fcf52b4bfee23a2f6502d455d546c

          SHA512

          13effa150d41d28d052f096dc5e994dd31eadc66a89368224221ed13813d777148d5f4c7c02b960c5eb8cb3977d06ac658b50d2ced7356443e4732c22e3ec1a6

        • C:\Users\Admin\AppData\Local\Temp\D3A8.tmp

          Filesize

          593B

          MD5

          926512864979bc27cf187f1de3f57aff

          SHA1

          acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

          SHA256

          b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

          SHA512

          f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

        • C:\Windows\apppatch\svchost.exe

          Filesize

          355KB

          MD5

          d96b5def8a2f5899a43910fe987985bf

          SHA1

          9e223298e9230ac9d226eeda6c6d5d810a687c36

          SHA256

          2b0a3d19637cccba6b6e8651e7af31537aeb8685d527b096882b5cb2da9eb74d

          SHA512

          69d76a2e7fd079a80438e897cadcf35fb1806510ec93b6c6aebc6b6800862de7f83b079a274226f4f0ae4da3cef07b405f3d52363b6e53eeaffd5250221d4166

        • memory/2648-21-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-43-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-17-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-18-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-19-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-20-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-15-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-23-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-24-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-45-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-26-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-27-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-29-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-32-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-34-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-33-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-38-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-39-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-16-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-42-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-22-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-50-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-51-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-60-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-62-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-64-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-13-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-66-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-68-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-70-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-74-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-71-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-78-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-79-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-80-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-10-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-308-0x0000000002B40000-0x0000000002BF6000-memory.dmp

          Filesize

          728KB

        • memory/2648-9-0x0000000002720000-0x00000000027C8000-memory.dmp

          Filesize

          672KB