Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 22:36

General

  • Target

    03c8634d24f2dd97578b9df2dadcf3ea_JaffaCakes118.exe

  • Size

    848KB

  • MD5

    03c8634d24f2dd97578b9df2dadcf3ea

  • SHA1

    829781c9167b0fff532cdbe822fc065bf4bf5825

  • SHA256

    2b8ff82de61c556efd75ffbe82f436022d2abc62b6b35e5bc078a937d025b50c

  • SHA512

    874d7fd99f7228d40727f5c49e8c3f3c7018f21fb93cbdc33ff890a5125138e67c5a9c163cca47143fa06a3e3b5e40c8bab282c427df84f91f8a797921521ac5

  • SSDEEP

    24576:J1bcny3Md9nUja2NzRWjoPnYmiYTv+SLBpO:J13Md6NMj+6te6

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c8634d24f2dd97578b9df2dadcf3ea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03c8634d24f2dd97578b9df2dadcf3ea_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1996

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX6441.tmp
    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe
    Filesize

    882KB

    MD5

    5a8237085cea4fac13820152605c11fc

    SHA1

    ac7281f84ceb570065ce412924627c2acca8819a

    SHA256

    56e4cb912d0980fcc371fe375e5b7ef9c4aa30d09199fea489a1c95332155efe

    SHA512

    5ae04957bfe49a931e1dc176c0a1f7e5c668d460e91ad93e068a15542ef97c4dab7df31c22c8d591bdb6c4b63ca6adec12dd9de81ca954fe3bf6fb829a06d9db

  • memory/1996-115-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-116-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-111-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-112-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-113-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-114-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-38-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-110-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-117-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-118-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-119-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-120-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-121-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB

  • memory/1996-122-0x0000000000400000-0x0000000000416000-memory.dmp
    Filesize

    88KB