Analysis

  • max time kernel
    150s
  • max time network
    58s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 20:40

General

  • Target

    1c6ca2771616a514c27f210da208d657_JaffaCakes118.exe

  • Size

    67KB

  • MD5

    1c6ca2771616a514c27f210da208d657

  • SHA1

    162232999c032b0886a47dc45272f323e1f9f356

  • SHA256

    81be84757757babd0358b058d3c88c48cc44306b1b7493eec63aeae47f2419af

  • SHA512

    3702e80798c7f6e0b1aa21001df88cf94a5f9c914bb94bf319459ac5cc3b54248463e67dca6d52dee3cddd3eed2e2fa10ddc437ea28120877017e2ad32d99c06

  • SSDEEP

    1536:aPKYFACHuT8NJVC/7Mj6wlEyFIT58+9kh6Ppo9yPalGBB9:aZHQ8NqOr2uITTI6cma0

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Users\Admin\AppData\Local\Temp\1c6ca2771616a514c27f210da208d657_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1c6ca2771616a514c27f210da208d657_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/616-49-0x0000000015200000-0x0000000015217000-memory.dmp

      Filesize

      92KB

    • memory/616-62-0x0000000015260000-0x0000000015277000-memory.dmp

      Filesize

      92KB

    • memory/616-7-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/616-13-0x0000000015120000-0x0000000015137000-memory.dmp

      Filesize

      92KB

    • memory/616-16-0x0000000015140000-0x0000000015157000-memory.dmp

      Filesize

      92KB

    • memory/616-21-0x0000000015160000-0x0000000015177000-memory.dmp

      Filesize

      92KB

    • memory/616-27-0x0000000015180000-0x0000000015197000-memory.dmp

      Filesize

      92KB

    • memory/616-34-0x00000000151A0000-0x00000000151B7000-memory.dmp

      Filesize

      92KB

    • memory/616-44-0x00000000151E0000-0x00000000151F7000-memory.dmp

      Filesize

      92KB

    • memory/616-92-0x0000000015320000-0x0000000015337000-memory.dmp

      Filesize

      92KB

    • memory/616-53-0x0000000015220000-0x0000000015237000-memory.dmp

      Filesize

      92KB

    • memory/616-56-0x0000000015240000-0x0000000015257000-memory.dmp

      Filesize

      92KB

    • memory/616-89-0x0000000015300000-0x0000000015317000-memory.dmp

      Filesize

      92KB

    • memory/616-37-0x00000000151C0000-0x00000000151D7000-memory.dmp

      Filesize

      92KB

    • memory/616-71-0x00000000152A0000-0x00000000152B7000-memory.dmp

      Filesize

      92KB

    • memory/616-68-0x0000000015280000-0x0000000015297000-memory.dmp

      Filesize

      92KB

    • memory/616-78-0x00000000152C0000-0x00000000152D7000-memory.dmp

      Filesize

      92KB

    • memory/616-82-0x00000000152E0000-0x00000000152F7000-memory.dmp

      Filesize

      92KB

    • memory/636-1-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/636-0-0x0000000000580000-0x0000000000592000-memory.dmp

      Filesize

      72KB