Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 02:51

General

  • Target

    1885ac32164a3c3fb975282fd657af8b_JaffaCakes118.exe

  • Size

    33KB

  • MD5

    1885ac32164a3c3fb975282fd657af8b

  • SHA1

    4fa06d53f0fb773eebfb57ec9ce59da866821daf

  • SHA256

    be72468b4c52745c92edfeb0668423da6ff8313237eeb18668913ec7a479ebf0

  • SHA512

    85a7b0f4a85f3e16bec4dc35bce6e289869445f705d817e25029d87998af6b2094fd28b28836990dc5582141cd4c4e50befa989487e243ddfcf3581eba1100ec

  • SSDEEP

    384:Gr9MUfDopREmd3yghuQtmJuLnfGFpm4ZNPq53m6Cjyg/v1PwJA3d7i4C+zrZ1xV4:Kzf01JyrlJUf8pmD+G0gKxydcXFy/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1885ac32164a3c3fb975282fd657af8b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1885ac32164a3c3fb975282fd657af8b_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1885AC~1.EXE >> NUL
      2⤵
      • Deletes itself
      PID:2944

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2868-1-0x0000000000220000-0x0000000000224000-memory.dmp

          Filesize

          16KB

        • memory/2868-2-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/2868-3-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB