Analysis

  • max time kernel
    9s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 23:25

Errors

Reason
Machine shutdown

General

  • Target

    2995a4fa753c92c0bf7697c398e98de7_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    2995a4fa753c92c0bf7697c398e98de7

  • SHA1

    299310e21bbd3d87e3b42abd1e04311b6d0b60b3

  • SHA256

    967efbd07429b24cbfbfba24c77a277714e27a3fb04c0adca2fd17c3b4aff10d

  • SHA512

    bcb238a20d073ab1f9b2970ce39b1a4134f9c9efc3875b3fce8a0b3dca187bf0dbfec20eadae6530d031ace043e6bf0c55740993c8968f9b54bd7b73eef1bc80

  • SSDEEP

    3072:gLy9tZbYFySGpH2WmIYxqdTPGvtyFEq35t17rLHof:gLyjZbYkdWIY8dTay3rtP

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2995a4fa753c92c0bf7697c398e98de7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2995a4fa753c92c0bf7697c398e98de7_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2540
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2004
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1336

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1336-6-0x0000000002760000-0x0000000002761000-memory.dmp

              Filesize

              4KB

            • memory/2004-5-0x0000000002980000-0x0000000002981000-memory.dmp

              Filesize

              4KB

            • memory/2540-0-0x0000000001000000-0x000000000101A000-memory.dmp

              Filesize

              104KB

            • memory/2540-2-0x0000000001000000-0x000000000101A000-memory.dmp

              Filesize

              104KB

            • memory/2540-1-0x0000000001001000-0x0000000001002000-memory.dmp

              Filesize

              4KB