Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 05:21

General

  • Target

    2761659ecdd96f91f7918fe79429238b_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    2761659ecdd96f91f7918fe79429238b

  • SHA1

    beab7537c807a01f67064ccee5d655de5be7cea8

  • SHA256

    76c25b7f488886d57b17b381263ffbb9368be0b7aca12ef45a5a511e2cd10346

  • SHA512

    116c8a47079622f7eb1c185892093beb9fd5a72a97642d98979e2fd2cf4c8693ff7fe876940ff9b22b2f3fba3b38bb0f7917b866bb45631505d83238fe3c2867

  • SSDEEP

    1536:iFxidJzaC4YKE85SR5n6ae8vTYf1FmzxYzCZqQAhj+AZy0rdLNQIOZbZTFXKfHW2:aQIMKEVZYPFGYmF85QzZblxKf04

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Users\Admin\AppData\Local\Temp\2761659ecdd96f91f7918fe79429238b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2761659ecdd96f91f7918fe79429238b_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/612-34-0x000000000EBE0000-0x000000000EBFE000-memory.dmp

      Filesize

      120KB

    • memory/612-50-0x000000000EC40000-0x000000000EC5E000-memory.dmp

      Filesize

      120KB

    • memory/612-64-0x000000000ECA0000-0x000000000ECBE000-memory.dmp

      Filesize

      120KB

    • memory/612-71-0x000000000ECC0000-0x000000000ECDE000-memory.dmp

      Filesize

      120KB

    • memory/612-59-0x000000000EC80000-0x000000000EC9E000-memory.dmp

      Filesize

      120KB

    • memory/612-9-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/612-14-0x000000000EB60000-0x000000000EB7E000-memory.dmp

      Filesize

      120KB

    • memory/612-19-0x000000000EB80000-0x000000000EB9E000-memory.dmp

      Filesize

      120KB

    • memory/612-30-0x000000000EBC0000-0x000000000EBDE000-memory.dmp

      Filesize

      120KB

    • memory/612-54-0x000000000EC60000-0x000000000EC7E000-memory.dmp

      Filesize

      120KB

    • memory/612-45-0x000000000EC20000-0x000000000EC3E000-memory.dmp

      Filesize

      120KB

    • memory/612-39-0x000000000EC00000-0x000000000EC1E000-memory.dmp

      Filesize

      120KB

    • memory/612-24-0x000000000EBA0000-0x000000000EBBE000-memory.dmp

      Filesize

      120KB

    • memory/1996-0-0x0000000000401000-0x000000000040B000-memory.dmp

      Filesize

      40KB

    • memory/1996-1-0x00000000005C0000-0x00000000005C4000-memory.dmp

      Filesize

      16KB

    • memory/1996-4-0x00000000005D0000-0x00000000005E2000-memory.dmp

      Filesize

      72KB

    • memory/1996-3-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1996-2-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1996-3004-0x0000000000401000-0x000000000040B000-memory.dmp

      Filesize

      40KB

    • memory/1996-3755-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB