Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 07:13

General

  • Target

    151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe

  • Size

    4KB

  • MD5

    151bfc12370a456fb53559a5ed023300

  • SHA1

    42341c77b106a984bc12b5b94e2c1e540bfcf6ca

  • SHA256

    b3433bfa474d012c61927e7ed40972286953e60b80fffa7636b4229ca6866fa3

  • SHA512

    65513a4d02a49b0563aa8c321b4ada4dcce5d2f6a3b4ac145a296e18b99e7c1b0fef53e1d4b0093663479c7ba4555a95dc7db9c4fec135fa961c4b92bb934045

  • SSDEEP

    96:O/4z9ZzuPxslRxD9VsQHldgOkID5EDlyTUoyn:GEpZFRD+sTUoyn

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Kills process with taskkill 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\151bfc12370a456fb53559a5ed023300_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwmain.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwmain.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4072
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwsrv.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwsrv.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1004
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwstub.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwstub.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3984
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c taskkill /f /im rfwproxy.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im rfwproxy.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\151BFC~1.EXE > nul
      2⤵
        PID:3048

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads