Analysis

  • max time kernel
    150s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/07/2024, 23:25

General

  • Target

    2a2853b981b86dbba2fb04858a256754_JaffaCakes118.exe

  • Size

    53KB

  • MD5

    2a2853b981b86dbba2fb04858a256754

  • SHA1

    adc3db292cb0b9c7378189e64de38e186d60079a

  • SHA256

    c9c22b7cee2bd6e946c57222b9d953d4aabf0fb0c6c5a3a2147dc3b308827a75

  • SHA512

    152c6295edf73c76117a12030e87ba6edfd76d058b577c8146752931ed6957d029d97f052f23cee93919b273c6d1d801f4d691a723699dc6ac7914dcd46ac8b5

  • SSDEEP

    1536:eVpkBal9PLMviKxICp8Qv8hnoRx5FZpCVyCS8Cbhsj1O:+pkBI9PLE2Cp8jhnoRx5FWwTbhs8

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
    • C:\Users\Admin\AppData\Local\Temp\2a2853b981b86dbba2fb04858a256754_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2a2853b981b86dbba2fb04858a256754_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:544

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/544-0-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/544-1-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/544-3-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/544-2-0x0000000000411000-0x0000000000413000-memory.dmp

            Filesize

            8KB

          • memory/544-3845-0x0000000000411000-0x0000000000413000-memory.dmp

            Filesize

            8KB

          • memory/608-42-0x0000000024650000-0x0000000024678000-memory.dmp

            Filesize

            160KB

          • memory/608-48-0x00000000246B0000-0x00000000246D8000-memory.dmp

            Filesize

            160KB

          • memory/608-26-0x00000000245C0000-0x00000000245E8000-memory.dmp

            Filesize

            160KB

          • memory/608-28-0x00000000245F0000-0x0000000024618000-memory.dmp

            Filesize

            160KB

          • memory/608-34-0x0000000024620000-0x0000000024648000-memory.dmp

            Filesize

            160KB

          • memory/608-13-0x0000000024560000-0x0000000024588000-memory.dmp

            Filesize

            160KB

          • memory/608-45-0x0000000024680000-0x00000000246A8000-memory.dmp

            Filesize

            160KB

          • memory/608-19-0x0000000024590000-0x00000000245B8000-memory.dmp

            Filesize

            160KB

          • memory/608-55-0x00000000246E0000-0x0000000024708000-memory.dmp

            Filesize

            160KB

          • memory/608-58-0x0000000024710000-0x0000000024738000-memory.dmp

            Filesize

            160KB

          • memory/608-63-0x0000000024740000-0x0000000024768000-memory.dmp

            Filesize

            160KB

          • memory/608-68-0x0000000024770000-0x0000000024798000-memory.dmp

            Filesize

            160KB

          • memory/608-73-0x00000000247A0000-0x00000000247C8000-memory.dmp

            Filesize

            160KB

          • memory/608-80-0x00000000247D0000-0x00000000247F8000-memory.dmp

            Filesize

            160KB

          • memory/608-8-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB