Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-07-2024 23:06

General

  • Target

    36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118.exe

  • Size

    391KB

  • MD5

    36c42dd50f28aee2acc8a20ebd43671f

  • SHA1

    786d7e7fe330f0d9abb0f6ada971b57030353cfb

  • SHA256

    9bf8a60e76a38b42be7d216073038851dd5d671816c7ff85bfa14a71f220302a

  • SHA512

    e8ec093452d3faacbfaa4febbeb44f3c1a582d42f17cdbd6399507386be140e199ab947c42e8fb9f327e4c56eccd0743fe0e7a69a1f32ef4bd1a9c7aed1a2631

  • SSDEEP

    12288:0tN/P3Zgc2IdOUWz8gYdZwuUYJGmr1xK2pE9:0tNHuiWzid+tYg4K2pA

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36c42dd50f28aee2acc8a20ebd43671f_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gema\gema.exe

    Filesize

    391KB

    MD5

    36c42dd50f28aee2acc8a20ebd43671f

    SHA1

    786d7e7fe330f0d9abb0f6ada971b57030353cfb

    SHA256

    9bf8a60e76a38b42be7d216073038851dd5d671816c7ff85bfa14a71f220302a

    SHA512

    e8ec093452d3faacbfaa4febbeb44f3c1a582d42f17cdbd6399507386be140e199ab947c42e8fb9f327e4c56eccd0743fe0e7a69a1f32ef4bd1a9c7aed1a2631

  • memory/1644-0-0x0000000002250000-0x00000000022AA000-memory.dmp

    Filesize

    360KB

  • memory/1644-1-0x00000000022B0000-0x0000000002317000-memory.dmp

    Filesize

    412KB

  • memory/1644-2-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/1644-16-0x00000000022B0000-0x0000000002317000-memory.dmp

    Filesize

    412KB

  • memory/1644-17-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB