Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 13:58

General

  • Target

    1a62f7c5cd3b403a927e45fb38de0aa1_JaffaCakes118.exe

  • Size

    80KB

  • MD5

    1a62f7c5cd3b403a927e45fb38de0aa1

  • SHA1

    4522df9aad71ef4610112c13963ce811fd5f237c

  • SHA256

    6c5ccc0183745949ef123c8e834173abfdb7ee80a1f77a669f17f0be8f84573a

  • SHA512

    8f8b43112fcc2332de75fc956b821b94c8a94e6f9529948460432b53220241534b4711a7e3b7b93f63f7cae2fdeb6c18939eeb061afe2afdd4b240bc1757dbff

  • SSDEEP

    1536:6QKJnfnsiaUK7VD1YdzbVzSCVtpNVzwuG9qdT0/1S3nByeSjj1pC9G3O3RtmSGbB:jioVD1wVzSuTzwX9E0/1n1H1pEG3Ohtu

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Users\Admin\AppData\Local\Temp\1a62f7c5cd3b403a927e45fb38de0aa1_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1a62f7c5cd3b403a927e45fb38de0aa1_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/612-32-0x0000000031660000-0x0000000031679000-memory.dmp

      Filesize

      100KB

    • memory/612-57-0x0000000031700000-0x0000000031719000-memory.dmp

      Filesize

      100KB

    • memory/612-39-0x0000000031680000-0x0000000031699000-memory.dmp

      Filesize

      100KB

    • memory/612-7-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/612-14-0x00000000315E0000-0x00000000315F9000-memory.dmp

      Filesize

      100KB

    • memory/612-21-0x0000000031600000-0x0000000031619000-memory.dmp

      Filesize

      100KB

    • memory/612-23-0x0000000031620000-0x0000000031639000-memory.dmp

      Filesize

      100KB

    • memory/612-28-0x0000000031640000-0x0000000031659000-memory.dmp

      Filesize

      100KB

    • memory/612-78-0x0000000031780000-0x0000000031799000-memory.dmp

      Filesize

      100KB

    • memory/612-72-0x0000000031760000-0x0000000031779000-memory.dmp

      Filesize

      100KB

    • memory/612-47-0x00000000316C0000-0x00000000316D9000-memory.dmp

      Filesize

      100KB

    • memory/612-42-0x00000000316A0000-0x00000000316B9000-memory.dmp

      Filesize

      100KB

    • memory/612-52-0x00000000316E0000-0x00000000316F9000-memory.dmp

      Filesize

      100KB

    • memory/612-67-0x0000000031740000-0x0000000031759000-memory.dmp

      Filesize

      100KB

    • memory/612-62-0x0000000031720000-0x0000000031739000-memory.dmp

      Filesize

      100KB

    • memory/3512-2-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/3512-3764-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/3512-1-0x0000000001DF0000-0x0000000001E02000-memory.dmp

      Filesize

      72KB

    • memory/3512-0-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB