Analysis

  • max time kernel
    66s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 14:32

General

  • Target

    05672b0c502360408642a5a685eef8f6_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    05672b0c502360408642a5a685eef8f6

  • SHA1

    9ad71de68d42235642f42f8e1ffdab4c42b1d3e5

  • SHA256

    af45320d01b199efd9e7550d70a9a3ed32e362a60ffd9ec1bc265999213facf5

  • SHA512

    b04447770025cc912379ca49b2a89d0967e5608d745652b540711b254b44b26734303e86b240261008c6a8c5b763bf1e8ef3b287e440fe36e07d1f54d84515db

  • SSDEEP

    24576:bBuZysoKR5Vagt/0zuBoGmr8K9hZ/KcMNQtJ1P5kchRwXqt4:bBuZysoKRmgt0SeGU8gZ/UNQtJ1hkchh

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05672b0c502360408642a5a685eef8f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05672b0c502360408642a5a685eef8f6_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3952

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3952-0-0x00000000004D0000-0x00000000004D1000-memory.dmp
    Filesize

    4KB

  • memory/3952-4-0x0000000000510000-0x0000000000511000-memory.dmp
    Filesize

    4KB

  • memory/3952-3-0x0000000000500000-0x0000000000501000-memory.dmp
    Filesize

    4KB

  • memory/3952-2-0x00000000004F0000-0x00000000004F1000-memory.dmp
    Filesize

    4KB

  • memory/3952-1-0x00000000004E0000-0x00000000004E1000-memory.dmp
    Filesize

    4KB

  • memory/3952-5-0x0000000000520000-0x0000000000521000-memory.dmp
    Filesize

    4KB

  • memory/3952-6-0x0000000000530000-0x0000000000531000-memory.dmp
    Filesize

    4KB

  • memory/3952-7-0x0000000000A80000-0x0000000000A81000-memory.dmp
    Filesize

    4KB

  • memory/3952-8-0x0000000000A90000-0x0000000000A91000-memory.dmp
    Filesize

    4KB

  • memory/3952-9-0x0000000000AD0000-0x0000000000AD1000-memory.dmp
    Filesize

    4KB

  • memory/3952-10-0x00000000032A0000-0x00000000032A2000-memory.dmp
    Filesize

    8KB

  • memory/3952-11-0x0000000003360000-0x0000000003362000-memory.dmp
    Filesize

    8KB

  • memory/3952-12-0x0000000003370000-0x0000000003372000-memory.dmp
    Filesize

    8KB

  • memory/3952-13-0x00000000035D0000-0x00000000035D2000-memory.dmp
    Filesize

    8KB

  • memory/3952-16-0x00000000039F0000-0x00000000039F2000-memory.dmp
    Filesize

    8KB

  • memory/3952-17-0x0000000003A00000-0x0000000003B2A000-memory.dmp
    Filesize

    1.2MB