Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 11:02

General

  • Target

    07825405c515a5295fbf49ac0a9f96a3_JaffaCakes118.exe

  • Size

    845KB

  • MD5

    07825405c515a5295fbf49ac0a9f96a3

  • SHA1

    5c6b7179324a0f79f4b838d31a5e355e46a644af

  • SHA256

    ad67e8eac8acf8c2fe5418ad4245a95f5a68a6d1c5b1c624e8735bdc3b55eb9b

  • SHA512

    0b09e1f570d7b001bb7af2735f2e0ddddd19e9a7a17c3e6dc653934e5355ef05352b25544421653ac4be08f81fa5ae760bd7dd7eccf9aaedfaeffbd4e6c63ac0

  • SSDEEP

    12288:51bAcZuDbe5BJ0htb1E16AJm/RteLzdVYMWadD4B6tx9rhY+qUCOjccyPkjtjNQU:51bLBJkt+1N+tetKLaOwtVWTOoYniYD

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07825405c515a5295fbf49ac0a9f96a3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07825405c515a5295fbf49ac0a9f96a3_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCX3371.tmp

          Filesize

          62KB

          MD5

          b126345317624479f78fbf30b3a1fe5a

          SHA1

          655c966bf7bbf96ee49c83062d30b9dba17d693c

          SHA256

          8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

          SHA512

          d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

        • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

          Filesize

          930KB

          MD5

          372fc290e1b4311c8cfac57cf21f4f64

          SHA1

          c581139ed07057fe971325c2b6462b173365ad54

          SHA256

          1a189733403eb8fe61de44841c83fa6427ef0ea40d940be22fb6d4524d24dcb6

          SHA512

          409441f295fe20d12a390b6508067bd9888f0aacbd281f18833b80530fc11f3a2c2ae72adf9b43af720423212821465c049262d559130d7195a4978e745c3a04

        • memory/1628-113-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-114-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-109-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-110-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-111-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-112-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-107-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-108-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-115-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-116-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-117-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-118-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-119-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/1628-120-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB