Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 12:15

General

  • Target

    225df107f273aec4d53dae85ee7a9fd7_JaffaCakes118.exe

  • Size

    76KB

  • MD5

    225df107f273aec4d53dae85ee7a9fd7

  • SHA1

    17030b366f3453951f5a5f39728f6df7d8a58aca

  • SHA256

    91643c3eb827708e4e39b070b3239d35f394da46f7d50760bfd19a68bd69656b

  • SHA512

    bc2b2adcdf936dd375e4348be67e7ce88254fb92b1da955d6b78425d969f7b694502e8fec0468bc48b9901d4636e8be63b85635d0a5f35b2906b24038e3540da

  • SSDEEP

    1536:42H3ghyOkEhYv11BKCHJbIsxoTv8r6+UTam6h7qfLOegdpGO:7HajYvJZpcDT8r6bTOegr

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:628
    • C:\Users\Admin\AppData\Local\Temp\225df107f273aec4d53dae85ee7a9fd7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\225df107f273aec4d53dae85ee7a9fd7_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4132

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/628-64-0x00000000063B0000-0x00000000063C7000-memory.dmp

      Filesize

      92KB

    • memory/628-34-0x00000000062F0000-0x0000000006307000-memory.dmp

      Filesize

      92KB

    • memory/628-12-0x0000000006270000-0x0000000006287000-memory.dmp

      Filesize

      92KB

    • memory/628-7-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/628-19-0x0000000006290000-0x00000000062A7000-memory.dmp

      Filesize

      92KB

    • memory/628-22-0x00000000062B0000-0x00000000062C7000-memory.dmp

      Filesize

      92KB

    • memory/628-52-0x0000000006370000-0x0000000006387000-memory.dmp

      Filesize

      92KB

    • memory/628-37-0x0000000006310000-0x0000000006327000-memory.dmp

      Filesize

      92KB

    • memory/628-29-0x00000000062D0000-0x00000000062E7000-memory.dmp

      Filesize

      92KB

    • memory/628-44-0x0000000006330000-0x0000000006347000-memory.dmp

      Filesize

      92KB

    • memory/628-109-0x00000000064D0000-0x00000000064E7000-memory.dmp

      Filesize

      92KB

    • memory/628-48-0x0000000006350000-0x0000000006367000-memory.dmp

      Filesize

      92KB

    • memory/628-82-0x0000000006430000-0x0000000006447000-memory.dmp

      Filesize

      92KB

    • memory/628-67-0x00000000063D0000-0x00000000063E7000-memory.dmp

      Filesize

      92KB

    • memory/628-74-0x00000000063F0000-0x0000000006407000-memory.dmp

      Filesize

      92KB

    • memory/628-79-0x0000000006410000-0x0000000006427000-memory.dmp

      Filesize

      92KB

    • memory/628-102-0x00000000064B0000-0x00000000064C7000-memory.dmp

      Filesize

      92KB

    • memory/628-88-0x0000000006450000-0x0000000006467000-memory.dmp

      Filesize

      92KB

    • memory/628-65-0x00000000063B0000-0x00000000063C7000-memory.dmp

      Filesize

      92KB

    • memory/628-92-0x0000000006470000-0x0000000006487000-memory.dmp

      Filesize

      92KB

    • memory/628-58-0x0000000006390000-0x00000000063A7000-memory.dmp

      Filesize

      92KB

    • memory/628-98-0x0000000006490000-0x00000000064A7000-memory.dmp

      Filesize

      92KB

    • memory/4132-1-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/4132-0-0x0000000000580000-0x0000000000592000-memory.dmp

      Filesize

      72KB