Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 01:25
Behavioral task
behavioral1
Sample
2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe
Resource
win7-20240704-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe
Resource
win10v2004-20240704-en
6 signatures
150 seconds
General
-
Target
2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe
-
Size
259KB
-
MD5
2a7e67a62675ae9267c7ec132d8116ef
-
SHA1
75f18ea14266a72e54d387daf02feb5f0a697d40
-
SHA256
764548ae8e6f42eb7eb49a84d28e286b9430a125d9dd80d9592c86f4f2bc5d31
-
SHA512
c0d4be7ba894b4faa985a793c208d90fbe02f428d1851283de49a3e4507dcd9013e6dd3b93b37206218046a181762acdd374e81846b3bd7de9b4196607af3fc6
-
SSDEEP
6144:TSAqWATnZSdjM6SoqizS0vzyCpMJE1d5L+H328r5h:ThUMdjRLLztpMJAz+X225h
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\2A7E67~1.EXE," 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2A7E67~1.EXE" 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\996ca63 = "C\x180Yω\x0e(ØÒ‘ù…n·A+µIÐèî1šz\u008f\x040Ò¶²©Ð‘µú\x02âéñ‚ìö‡¹ÙÔÙ\x7f˲¤Y$ê±ÁZ(›\x12¾È\u00adá\x0fþk=)>³à̾¨\ntI„`\\s8G¤Xœÿ~r}\u008d\x1a5Ná8,ªÄoP\"'¼áßiª¡(ÞVÛ©†\b=SNO\"jWy%Äb‰~\rese£v]rÛÅÕ\x7fâÚmªÚábe±%¸Íª0Ô*…Ít4ÇßyÌCªJm\a\x13AN4ÙÅ%ý3Ì%¼‘ûwÑV`ì\u008d›·\x7f%" 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2A7E67~1.EXE" 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe Token: SeSecurityPrivilege 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe Token: SeSecurityPrivilege 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe Token: SeSecurityPrivilege 4620 2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a7e67a62675ae9267c7ec132d8116ef_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620