Analysis

  • max time kernel
    142s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 11:20

General

  • Target

    078b11b318afc4054fd53226a6f448bb_JaffaCakes118.exe

  • Size

    495KB

  • MD5

    078b11b318afc4054fd53226a6f448bb

  • SHA1

    41c9d535a98582ca5751850bc7c68196e61eef21

  • SHA256

    a2a2106fa7363b1aef226e14ae61b41f9d24d075b7f2157b17af9f00e47848be

  • SHA512

    15982e1d7c0a9ca93fc731644e3216f5d5f4be034806ef095e7e81fae1a04c59582509d0036174374479646bc8e9e87371e4d88460bdbc44980cdb2f0bb1236b

  • SSDEEP

    12288:b1b9urFBV+DAIAzZUwkkhcA9M/Gm84f/8:b1b9EBV+kF14/L8

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\078b11b318afc4054fd53226a6f448bb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\078b11b318afc4054fd53226a6f448bb_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCXA8FE.tmp

          Filesize

          62KB

          MD5

          b126345317624479f78fbf30b3a1fe5a

          SHA1

          655c966bf7bbf96ee49c83062d30b9dba17d693c

          SHA256

          8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

          SHA512

          d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

        • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

          Filesize

          930KB

          MD5

          275f965a213ad0984a5c6d5bae390903

          SHA1

          d4f50491f0bcf807bfcb6ac77ed2eca5698cd92f

          SHA256

          7d258f936b4262f5220d59df5d61a0b295641db2f22861a4eee6a8a3736662de

          SHA512

          61389b353d86b212dd8cf7ac169c79a89a089182880ccddb73681222cf3152211f880cd13fb8beefecff95313d47d25d8566014f9a0c97681a908c579e6c3d72

        • memory/2244-109-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-110-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-105-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-106-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-107-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-108-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-37-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-104-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-111-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-112-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-113-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-114-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-115-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2244-116-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB