Analysis

  • max time kernel
    148s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 17:12 UTC

General

  • Target

    0a2e159600ace29d7f8219e8a79738f0_JaffaCakes118.exe

  • Size

    254KB

  • MD5

    0a2e159600ace29d7f8219e8a79738f0

  • SHA1

    0da9c6e7c8dfc761d5f66f4bf723e304337122b1

  • SHA256

    d1daed5dd378098d30d82da2c7ac87a3deec2111d664b28213fcd7f1e7de1aa3

  • SHA512

    ce94a87a714c751efcdf47c33956b4d37b2a9315080c1458c102182fcc21ec5d67d9d80236ef57bd1a59b03c131beefc78a30d5801e529a3c82890ba425f2afc

  • SSDEEP

    6144:C731bdBaB19NqsvqpaW72u8eS01mBJdWN62YUCJZ7ygE6lga:I1biTuac18eJ1mBPW04CJZOt6r

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a2e159600ace29d7f8219e8a79738f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a2e159600ace29d7f8219e8a79738f0_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX27DD.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe

    Filesize

    259KB

    MD5

    d64657254ea6cf3d03d6526c25d76b7c

    SHA1

    c22cb219f77ffba95625c2ba440d0e0ee3b92232

    SHA256

    19da34b554e73faf791e61239301585382b05574fed222cc5239021b291e18f6

    SHA512

    45e7e7027c0a7cedfb53546719faab4ba8eb8d37616af682f1a81593633473f2cc99b3398e6e82c1bb9972e51283129c2385f5962e60626fe83b2bfd2c6843bc

  • memory/2616-114-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-115-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-110-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-111-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-112-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-113-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-108-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-109-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-116-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-117-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-118-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-119-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-120-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2616-121-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.