Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 06:20

General

  • Target

    3c48c6671a3992c9b55638780800e82f_JaffaCakes118.exe

  • Size

    260KB

  • MD5

    3c48c6671a3992c9b55638780800e82f

  • SHA1

    16745ef4d3cf600d846810d9a9d961f0fceca871

  • SHA256

    7ace77fbd2da11d0226e0102bb0459403c72130dfc587b090cdba360c92e3177

  • SHA512

    c3c5a6e398353d2fb026a58fae361aebc460ed23f5b77a26ec7d2ccd8cfdb1d7827f151a79c9572cde93828d1712ee6d4ae9c513d4701122ce2e1e634fbed482

  • SSDEEP

    6144:rjuc4Q8Shv4Xbjw8y4AWE/XY3RMxOoA78qyAUqtYckVoSY:/Lf8Sx4rjnyH3o3SuSY

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c48c6671a3992c9b55638780800e82f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c48c6671a3992c9b55638780800e82f_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    PID:4732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\wbem\f_user.dda

          Filesize

          14B

          MD5

          046154448a5ce7ac8c398cba52935657

          SHA1

          03217b60f58ba91aec8f66e32782fa0ea9cb85cf

          SHA256

          7971c1d7b10099b88d3aef9b6e372097ce234e14dcaa7c5805941dfbecb05522

          SHA512

          e53b84ffb87683e782f9ff96491ceff2fbdcef46baf2e3dee44d3ccbcfb278a9f52971db69e91fce8b8de39dab55213f1d4b8f328b2fe039df7dd89259f81c8d

        • memory/4732-0-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/4732-8-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/4732-9-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/4732-16-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB

        • memory/4732-17-0x0000000000400000-0x000000000044B000-memory.dmp

          Filesize

          300KB