Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 03:26

General

  • Target

    65d93c54a10df5b5a15f43f34d10e667_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    65d93c54a10df5b5a15f43f34d10e667

  • SHA1

    8c66e12da7c21bdcaec94abbde9d6130fac31f20

  • SHA256

    5844d10558f2461fbf8d40cb5e91c92da2c829cb99da9ba3c88c42d9ce108666

  • SHA512

    aa29ce495abd357b7b394796092cd3b06aa6c6aee9de262abbd7b9f80dec516230919513717df675938b24a48d57d29194dcd9a7e91d0a9efea6b4c73546c5e1

  • SSDEEP

    1536:1T7Yexd1XXXXlCDVuF08+ldlrRPIQMg3k/Tj:F7YexrXXXXlCD58+lBIQMg3k/n

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65d93c54a10df5b5a15f43f34d10e667_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65d93c54a10df5b5a15f43f34d10e667_JaffaCakes118.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1296
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:2624

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1160-9-0x0000000002510000-0x0000000002518000-memory.dmp
    Filesize

    32KB

  • memory/1160-8-0x0000000077750000-0x00000000778F9000-memory.dmp
    Filesize

    1.7MB

  • memory/1160-13-0x0000000077750000-0x00000000778F9000-memory.dmp
    Filesize

    1.7MB

  • memory/1296-0-0x0000000000020000-0x0000000000021000-memory.dmp
    Filesize

    4KB

  • memory/1296-3-0x0000000000030000-0x0000000000031000-memory.dmp
    Filesize

    4KB

  • memory/1296-2-0x0000000000400000-0x0000000000413000-memory.dmp
    Filesize

    76KB

  • memory/1296-1-0x0000000000400000-0x0000000000413000-memory.dmp
    Filesize

    76KB

  • memory/1296-4-0x0000000000230000-0x0000000000249000-memory.dmp
    Filesize

    100KB

  • memory/1296-5-0x0000000000270000-0x0000000000271000-memory.dmp
    Filesize

    4KB

  • memory/1296-6-0x0000000000400000-0x0000000000413000-memory.dmp
    Filesize

    76KB

  • memory/1296-7-0x0000000000230000-0x0000000000249000-memory.dmp
    Filesize

    100KB

  • memory/2624-10-0x00000000000C0000-0x00000000000C8000-memory.dmp
    Filesize

    32KB