Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-06-2024 12:11

General

  • Target

    05df61895db79d24796d8f04cbb5e65c_JaffaCakes118.exe

  • Size

    70KB

  • MD5

    05df61895db79d24796d8f04cbb5e65c

  • SHA1

    ad990c45a86ded2d7166793fb56fb00933e62321

  • SHA256

    c89c473bb8855ef93d330c6bac7eedd2a0abcb509bc67f34277ce975690262a9

  • SHA512

    2ecaca11ca3a02e3780aaffb163a1c9c90353977bb0e49ecd5e01a77b2e2b66e2d2364befb1c1e0dd5df3d819eec81000f6162600ac7e5cd61b89e29eb0a80d6

  • SSDEEP

    1536:iXC1VKZv2jJODZFQmPx5807jcVDON16VWy0oqNOb:rVK1PQKxN2S/6T08

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05df61895db79d24796d8f04cbb5e65c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\05df61895db79d24796d8f04cbb5e65c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies WinLogon
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\bfsvc.exe
      C:\Windows\bfsvc.exe
      2⤵
        PID:1628
      • C:\Windows\bfsvc.exe
        C:\Windows\bfsvc.exe
        2⤵
          PID:2608

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1676-0-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/1676-1-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/1676-2-0x000000007DD60000-0x000000007DE70000-memory.dmp

        Filesize

        1.1MB

      • memory/1676-13-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB