Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe
-
Size
168KB
-
MD5
f8afe38319cc691f948214bc3907eadd
-
SHA1
4cc870c1b5b4bcb2da1a23c811e6a0f25ec5cec1
-
SHA256
a59f924c88eb95666043249b1f9f77f606b3e601cdcec549ec6ddd0b3448c617
-
SHA512
fe3fe08919cd06357cb6e948ebc4e38bb9aec291195aac7275980c87b999ec674694465a5b8a39205006f26547df1cad41b206ea23a1c27dd3991b2d3c15d307
-
SSDEEP
3072:viqXwQU66AagjXdL+A1uXHnVO5Gpmt7fzHOyE/AryPtLbZiMwdwRB9Xrx1Jefz:viNAaqh5oHnVO5GgjzHOyaPhZkdwRB9K
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1826666146-2574340311-1877551059-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\B3BA4\\C7C1C.exe" f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1276-1-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2744-8-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/2744-10-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1276-11-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4364-77-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/4364-76-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1276-78-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral2/memory/1276-169-0x0000000000400000-0x0000000000491000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2744 1276 f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe 88 PID 1276 wrote to memory of 2744 1276 f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe 88 PID 1276 wrote to memory of 2744 1276 f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe 88 PID 1276 wrote to memory of 4364 1276 f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe 89 PID 1276 wrote to memory of 4364 1276 f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe 89 PID 1276 wrote to memory of 4364 1276 f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe startC:\Program Files (x86)\LP\1C1B\F73.exe%C:\Program Files (x86)\LP\1C1B2⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f8afe38319cc691f948214bc3907eadd_JaffaCakes118.exe startC:\Program Files (x86)\A49A9\lvvm.exe%C:\Program Files (x86)\A49A92⤵PID:4364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5ccd7b117c7c7d8a53e5e092fd73ac350
SHA1fc50645c31c6d874fa4136a30e2808d1654782c6
SHA2566b43c289b7dee8f7c8b6872157fb6a23bab5227124d2ad4d79f49e0a828720a8
SHA512528b2c3d922345da88106617bf31049eb85ded60eece252efe8b5e1a802af944d83a5c7c4ae98778edcc618c13bfc30997ec0e628a9da5f3bbb25ba80f7faec5
-
Filesize
1KB
MD516de09fef478ead3db9f7a99a12607f1
SHA134d274af01c5d39cf28b4ed5184a4dfedcc45575
SHA2565e4289f4933dc126cdcf5c1477e85a5691514833414a3f759387ea96b6e55aab
SHA51256ba097ad48f9b9f7a6ecb3ad6362273ca182425fd529fac4079d8f7ff680621f2dfeb27406276ff0374da4db47b04eadd2391dba571319e6327b4d0e6c7ef06
-
Filesize
696B
MD569a216e13ee47fb20812252a392616f1
SHA13331a8bef1b6c8c37aa9a744e5b7f054cc0134ae
SHA2561f4b1e51d7fe587b195ca12c1811c0210db2e505086d8ecf7857e688b4348942
SHA512d11728be6470bcb31c31ee4ac527c021c3dea10155c7c78816d52c4c2f3f37cebdcbe374f95dfe254fa1522f22c5caf067a308b36aa5d5557f4d4bfbf26c5292