Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 04:50

General

  • Target

    06daa59ddbc7ac4a32d68392b198c544_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    06daa59ddbc7ac4a32d68392b198c544

  • SHA1

    63ee78c881f586b47d0c9367f594c3fa816e5252

  • SHA256

    3b8a3207308627a9b0f0799f3c943ec93902d4871c3ed5ab2d3b4ca41f288016

  • SHA512

    06ad7b1ca8e81a009913fea045053f99baa3e9f524872db744f6275ac511ce16ae5c4a03257253eff48ac772024aa546769428d5a0ce0c5ef6bf36be2a75c6e3

  • SSDEEP

    3072:X1B31bdBob2QX+g4ETj3SCfOUHgUQ+UnlPMWxEvlmbgn9yqeMWycAd8l:X731bdBaB+gp3BOqLQ+UlIvlmbgn9VJW

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06daa59ddbc7ac4a32d68392b198c544_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\06daa59ddbc7ac4a32d68392b198c544_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX66B1.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    930KB

    MD5

    acf95e2a46b1d3d646de764bc4be2f01

    SHA1

    7587385d3630f883932730b62cb25f4520d09df5

    SHA256

    47efcdbcf6bc17eb0f4f198e4a11c93d77cc7a48ab568129fac0420fa03a1e3c

    SHA512

    380e2e7a04b0de3bede602e12b820cd7b7aafe7b95efbc68ce6adf4c0837e1eaf6cf1f1a17d8c8c2cc00b8dbacff1622f24bb252aae7e06b178b50dc517114d0

  • memory/2324-116-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-117-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-36-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-111-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-118-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-119-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-120-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-121-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-122-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2324-123-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB