Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/04/2024, 16:39

General

  • Target

    059f179e6aab2685a59a4e4baa2f9837_JaffaCakes118.exe

  • Size

    3.4MB

  • MD5

    059f179e6aab2685a59a4e4baa2f9837

  • SHA1

    0751865914821219174925be8774a8516488170e

  • SHA256

    f99415c6c8029164d029b661c1001af99e4eefc95b9192f0e6cae8d329a77960

  • SHA512

    f638bbab04d568f4ed28ec9d091845df52b44171ebae0408ef539ec206ae91002a2db18cd63aca622e2c576160cd7734db49a4eeb53b1adf253223f34c2b8c0f

  • SSDEEP

    98304:iFZjFcCI53K5eyn1KSvAtB1nrVDFjijkXa:iHFcBa5ekFoPx7Xa

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\059f179e6aab2685a59a4e4baa2f9837_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\059f179e6aab2685a59a4e4baa2f9837_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2876

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCXA4E9.tmp

          Filesize

          62KB

          MD5

          b126345317624479f78fbf30b3a1fe5a

          SHA1

          655c966bf7bbf96ee49c83062d30b9dba17d693c

          SHA256

          8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

          SHA512

          d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

        • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

          Filesize

          3.4MB

          MD5

          249a65fd80ec8d81c822f0a731095ad6

          SHA1

          62491948ffef3c9f3500a6f9999c4a88bcbdd4d7

          SHA256

          7ad3d0099e8b218c0c72577e36d6cec0b2344d422199ac44f42307d965852966

          SHA512

          c413e4f35f9edda878bbf3915d4af47dc3592e82bd90ae3c5000cea3dffdfb4423216f334403dd275abe7d93ba39d38660f19d52cb21205765b7c081398332ad

        • memory/2876-122-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-123-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-118-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-119-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-120-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-121-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-116-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-117-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-124-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-125-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-126-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-127-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-128-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2876-129-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB