Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    01-05-2024 19:28

General

  • Target

    0ca630ca4473005bc963d027360202de_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    0ca630ca4473005bc963d027360202de

  • SHA1

    660892ad7a0ceec8e7c1dabe7ca6014618fb509a

  • SHA256

    b3133d98d46aff9ff0b85ca3748ec4fb4dab26d0f46f48e10802878fc16b2b43

  • SHA512

    1fb50b118a24b7b85191fcddf5d6ab50fcd20eb94e7eff61f655b9af9cb5951c7f96df378eb2b3094addbfffa3476572620682c84b28b4380affa3b51a1487be

  • SSDEEP

    24576:S1b3kDpKBbUeKCi6bItG20SO0+76R8DXlxrlcG7DC7+K5OjSkZ8YM207YTxOzHVA:ScpclKCQdOv6ireGfQoPMP7/HVZEPZ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ca630ca4473005bc963d027360202de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0ca630ca4473005bc963d027360202de_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX3584.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    1.6MB

    MD5

    3983c04b71cf7a0e47b1990937c621db

    SHA1

    9f68af808332150f8ba930437da92ef322a464a6

    SHA256

    7ad0fa02e20bded79ca53b68ccb71d012b7f66143a34e7bfd8714058a97d5a12

    SHA512

    e5a2b20c288e9b1b2d80832a5ff57147f4f2f639b405bbb831c3160363163cd501d47c910f6893fa77d50640b954a5d41a447cc86701b8e82d7eafa262236298

  • memory/1516-106-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-107-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-102-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-103-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-104-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-105-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-100-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-101-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-108-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-109-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-110-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-111-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1516-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB