Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-04-2024 04:50

General

  • Target

    06daa59ddbc7ac4a32d68392b198c544_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    06daa59ddbc7ac4a32d68392b198c544

  • SHA1

    63ee78c881f586b47d0c9367f594c3fa816e5252

  • SHA256

    3b8a3207308627a9b0f0799f3c943ec93902d4871c3ed5ab2d3b4ca41f288016

  • SHA512

    06ad7b1ca8e81a009913fea045053f99baa3e9f524872db744f6275ac511ce16ae5c4a03257253eff48ac772024aa546769428d5a0ce0c5ef6bf36be2a75c6e3

  • SSDEEP

    3072:X1B31bdBob2QX+g4ETj3SCfOUHgUQ+UnlPMWxEvlmbgn9yqeMWycAd8l:X731bdBaB+gp3BOqLQ+UlIvlmbgn9VJW

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06daa59ddbc7ac4a32d68392b198c544_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\06daa59ddbc7ac4a32d68392b198c544_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\jar.exe

    Filesize

    63KB

    MD5

    a4f7e89245525decc89350e6f314d166

    SHA1

    631156fb8366ea93d30564770df0173d5189b5fc

    SHA256

    b183c2e1f180d849aea73d0602f0872bffb88783ae59fc71ae0e560ee870027b

    SHA512

    3887b503eae86e8a652603e3c69e251a3a17a9c704bff5ca961d43f4876ce23b5577cf7914bc42635a61cf5488ffa91daf33d8c7de6a2a6955b3208c17f948c1

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    930KB

    MD5

    7ab257760c5dd44832fd2e37be21bada

    SHA1

    c32a066e9b748436800eda4684c2912bc83dbeb4

    SHA256

    8481c0ac56f0f57aade8bf1e462de7a8e282d56914f1a12bc8f23b00a5b56033

    SHA512

    9dae072021d968319a0e81edee6a7330f4da1956085bd8c786d3b2db2708f0bbe24b7dd444e24c470cc1b7c74532a46937ba51966cea0188ce428868e1409461

  • memory/2616-95-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-92-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-93-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-94-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-26-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-96-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-97-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-98-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-99-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-100-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2616-101-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB