Analysis

  • max time kernel
    150s
  • max time network
    55s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 22:24

General

  • Target

    03c281d0c79898ba5e0c472c0093cb4d_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    03c281d0c79898ba5e0c472c0093cb4d

  • SHA1

    e3313bf5c501460615885d1a51ea7bc7a5b14851

  • SHA256

    9f2238381a864db192fb8b902a11e8c1d7170b2ab03aae723952e03518dda34a

  • SHA512

    7e642e1541293ed0888d72ff7819590fa85106939c66ea4b048682b636e596baf1e858d722697d1f6ecb090bcf34ff25e88c8e4e8bca92f217a7d816aeefd903

  • SSDEEP

    24576:91bRfdYmRwmOcwLMIorvUhK9BoDyzPBP7qT4PQKL+0fCjovvbOjrdX3:9bfGmRwNcodor8h2yDgBP7ZlL+0QrdX3

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c281d0c79898ba5e0c472c0093cb4d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03c281d0c79898ba5e0c472c0093cb4d_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:4280

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\java-rmi.exe
    Filesize

    108KB

    MD5

    9e3965c87aa864c1eff185b4d06f87ed

    SHA1

    f4061d73356035f56e56bb2df075ece5b26de531

    SHA256

    6426031df9a29d70a830c717a71ba7d3d7e7b30da6ad2b1e00a1831689b61f3b

    SHA512

    e54ad04f89008bb22543ac72c31af39c56c4263a3199248033b7d039fe92739969e8119dcc44b5405896bc1581d2ca7b0e83b3ef8c809289146731d6ee77cc1a

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe
    Filesize

    1.2MB

    MD5

    03c281d0c79898ba5e0c472c0093cb4d

    SHA1

    e3313bf5c501460615885d1a51ea7bc7a5b14851

    SHA256

    9f2238381a864db192fb8b902a11e8c1d7170b2ab03aae723952e03518dda34a

    SHA512

    7e642e1541293ed0888d72ff7819590fa85106939c66ea4b048682b636e596baf1e858d722697d1f6ecb090bcf34ff25e88c8e4e8bca92f217a7d816aeefd903

  • memory/4280-28-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-29-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-22-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-23-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-24-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-25-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-20-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-21-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-19-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-104-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-105-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-106-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-107-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/4280-108-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB