Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 19:18

General

  • Target

    0f394c3b8e22c703590f14446fca33d9_JaffaCakes118.exe

  • Size

    243KB

  • MD5

    0f394c3b8e22c703590f14446fca33d9

  • SHA1

    b1354af512ba2774b8c96ad5c42d33fa0ac11c08

  • SHA256

    6b9d7be16a7b3ae02ee056bd3fe21f0f7567e7a99238ec458db966219895812f

  • SHA512

    847b3e5c9bc3384f3e231da5cc9924f2be0ddedbc9bf24222fad995b11b4ede8aeef51a7675e2871923a501b21c4d5cd54bf1a6bec09c91f054aea8b1e19bc19

  • SSDEEP

    6144:BH3Jh95UbcMYDd2R2G136wH/8cYZJoeX7XBsyknw3IKn3x:BH3r7UeDd2RNNHUc8JoQDVkw3IKh

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f394c3b8e22c703590f14446fca33d9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f394c3b8e22c703590f14446fca33d9_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3904

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3904-0-0x000000007FDE0000-0x000000007FE49000-memory.dmp

          Filesize

          420KB

        • memory/3904-1-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/3904-2-0x0000000000600000-0x0000000000601000-memory.dmp

          Filesize

          4KB

        • memory/3904-3-0x0000000002540000-0x00000000025F2000-memory.dmp

          Filesize

          712KB

        • memory/3904-4-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/3904-5-0x0000000002700000-0x00000000027B8000-memory.dmp

          Filesize

          736KB

        • memory/3904-9-0x0000000002700000-0x00000000027B8000-memory.dmp

          Filesize

          736KB

        • memory/3904-7-0x0000000002700000-0x00000000027B8000-memory.dmp

          Filesize

          736KB

        • memory/3904-63-0x000000007FDE0000-0x000000007FE49000-memory.dmp

          Filesize

          420KB

        • memory/3904-64-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/3904-67-0x00000000035D0000-0x00000000035D1000-memory.dmp

          Filesize

          4KB

        • memory/3904-71-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/3904-77-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/3904-76-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/3904-84-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB