Analysis

  • max time kernel
    150s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 06:42

General

  • Target

    2f5753cbe2aec3a462c85f987d669e1f_JaffaCakes118.exe

  • Size

    50KB

  • MD5

    2f5753cbe2aec3a462c85f987d669e1f

  • SHA1

    f20a5b94771944ff8b5905d80c002bbf6e51cc08

  • SHA256

    f3cc6ab9167ec53e1ac5eb9540be51a506c5a860e6e4616b33b480f18ed3726f

  • SHA512

    f71aac94a198499a9039cd328a9ebba56b58ba53ee03d2c06a9ebed670495c7c58c572919e1bfa3bcf16fe4f2705e008da052089ce0ca9d23f7f3a68ed7b73cc

  • SSDEEP

    1536:vnDMUkgOr1xfD/4gV+2GawEXdUG2bTHJfq:vDMUdOJxL/ls2tntXWJ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:628
    • C:\Users\Admin\AppData\Local\Temp\2f5753cbe2aec3a462c85f987d669e1f_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2f5753cbe2aec3a462c85f987d669e1f_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/628-39-0x000000003A1D0000-0x000000003A1F6000-memory.dmp

      Filesize

      152KB

    • memory/628-53-0x000000003A260000-0x000000003A286000-memory.dmp

      Filesize

      152KB

    • memory/628-79-0x000000003A350000-0x000000003A376000-memory.dmp

      Filesize

      152KB

    • memory/628-73-0x000000003A320000-0x000000003A346000-memory.dmp

      Filesize

      152KB

    • memory/628-8-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/628-15-0x000000003A0E0000-0x000000003A106000-memory.dmp

      Filesize

      152KB

    • memory/628-18-0x000000003A110000-0x000000003A136000-memory.dmp

      Filesize

      152KB

    • memory/628-25-0x000000003A140000-0x000000003A166000-memory.dmp

      Filesize

      152KB

    • memory/628-36-0x000000003A1A0000-0x000000003A1C6000-memory.dmp

      Filesize

      152KB

    • memory/628-69-0x000000003A2F0000-0x000000003A316000-memory.dmp

      Filesize

      152KB

    • memory/628-48-0x000000003A230000-0x000000003A256000-memory.dmp

      Filesize

      152KB

    • memory/628-43-0x000000003A200000-0x000000003A226000-memory.dmp

      Filesize

      152KB

    • memory/628-64-0x000000003A2C0000-0x000000003A2E6000-memory.dmp

      Filesize

      152KB

    • memory/628-28-0x000000003A170000-0x000000003A196000-memory.dmp

      Filesize

      152KB

    • memory/628-60-0x000000003A290000-0x000000003A2B6000-memory.dmp

      Filesize

      152KB

    • memory/4556-0-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/4556-1-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/4556-2-0x0000000000410000-0x0000000000412000-memory.dmp

      Filesize

      8KB

    • memory/4556-3-0x0000000000400000-0x0000000000426000-memory.dmp

      Filesize

      152KB

    • memory/4556-3740-0x0000000000410000-0x0000000000412000-memory.dmp

      Filesize

      8KB