Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 22:14

General

  • Target

    03beac3afcc5a9b76c61b379117ab4c8_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    03beac3afcc5a9b76c61b379117ab4c8

  • SHA1

    b73baee44f126066414e867ed9e755649b8d0381

  • SHA256

    bcd053711d20c9abbc48d0b2146f70124ce63f71310b6997acfcc0aa0543d404

  • SHA512

    808af708c03ad94e94325a3df51db056238e956599595e91d3ccca094314d5a5e067ad8f28331ac42ec21b7ec6392aeb5f46e70295cd3d3fe30a5a890647e39d

  • SSDEEP

    49152:9WAMXZZaYGPeVALqx95dXLrnURAwrcD6BvvTxLKyc2A7u3Idr9x7EY:aX2YA2Aw9LbrnWFg+BvLtKLuYdr9H

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03beac3afcc5a9b76c61b379117ab4c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03beac3afcc5a9b76c61b379117ab4c8_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2240

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX1F94.tmp
    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe
    Filesize

    2.2MB

    MD5

    df0b0a123d9d48a79c7a68d0532cd1ca

    SHA1

    810b91244ee37fd2a8e92e3416b43e4192dbdb7c

    SHA256

    e634c84c7b6870ce004c82b334f0ee2f7e2dcf24ac35202e33ac51399aabbcc0

    SHA512

    49b8f08645dd5875d8c66675b41fe0ba561396a2a2e0242777d09ff3f245525442ba79e9b9ad882567acb24a5d594065446348c15a5e40ed03dc6f1981982c0e

  • memory/2240-122-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-123-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-118-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-119-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-120-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-121-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-116-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-117-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-124-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-125-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-126-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-127-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-128-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/2240-129-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB