Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 07:31

General

  • Target

    040c29f2e1ddd52b5d3d82342be5c054_JaffaCakes118.exe

  • Size

    53KB

  • MD5

    040c29f2e1ddd52b5d3d82342be5c054

  • SHA1

    cef679049cee05ef4af8ca5c38bf178d3d9f9b51

  • SHA256

    46fe68cfcc069a984cdc39beb9a8e6a5ff07f23281efffb7d09e9b95d0246840

  • SHA512

    c50f839bb29ff5a9b7f696fbc2ad5b06633a18736ecbc6513134effc5b4c4ed4fb1623a4618a2c218d99da1741776991328a1a5b13079c5b5dd857cca3eddf3a

  • SSDEEP

    1536:FVfNQv25QsT3RNGx8Z062GS+86kaYKRPdBIxyIGWjWSOP:FVp5QubL0DGS+vbRlBtV5

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
    • C:\Users\Admin\AppData\Local\Temp\040c29f2e1ddd52b5d3d82342be5c054_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\040c29f2e1ddd52b5d3d82342be5c054_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/608-29-0x0000000019610000-0x0000000019638000-memory.dmp

      Filesize

      160KB

    • memory/608-56-0x0000000019700000-0x0000000019728000-memory.dmp

      Filesize

      160KB

    • memory/608-33-0x0000000019640000-0x0000000019668000-memory.dmp

      Filesize

      160KB

    • memory/608-73-0x00000000197C0000-0x00000000197E8000-memory.dmp

      Filesize

      160KB

    • memory/608-8-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/608-13-0x0000000019580000-0x00000000195A8000-memory.dmp

      Filesize

      160KB

    • memory/608-18-0x00000000195B0000-0x00000000195D8000-memory.dmp

      Filesize

      160KB

    • memory/608-23-0x00000000195E0000-0x0000000019608000-memory.dmp

      Filesize

      160KB

    • memory/608-69-0x0000000019790000-0x00000000197B8000-memory.dmp

      Filesize

      160KB

    • memory/608-63-0x0000000019760000-0x0000000019788000-memory.dmp

      Filesize

      160KB

    • memory/608-43-0x00000000196A0000-0x00000000196C8000-memory.dmp

      Filesize

      160KB

    • memory/608-38-0x0000000019670000-0x0000000019698000-memory.dmp

      Filesize

      160KB

    • memory/608-48-0x00000000196D0000-0x00000000196F8000-memory.dmp

      Filesize

      160KB

    • memory/608-58-0x0000000019730000-0x0000000019758000-memory.dmp

      Filesize

      160KB

    • memory/4960-3-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4960-3755-0x0000000000411000-0x0000000000413000-memory.dmp

      Filesize

      8KB

    • memory/4960-2-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4960-1-0x0000000000411000-0x0000000000413000-memory.dmp

      Filesize

      8KB

    • memory/4960-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB