Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 22:32

General

  • Target

    61ac2256a931e259e3978b8731519242_JaffaCakes118.exe

  • Size

    241KB

  • MD5

    61ac2256a931e259e3978b8731519242

  • SHA1

    342987b6d29af9849d6f2ccd6b349706d2da7b3d

  • SHA256

    f3f360afbe615cb0e21bbef7f14eb6d9806bd7bb2a2ee3c5f0e3634793034d7e

  • SHA512

    362f1be0b43e0ff37da337ef69b7c14dfc922987af2f016d3fa13b5a7ac1de2cef9130cbd16bc3c1f5def06111bed13b257f2c68d02e2f55ece07baafc48edfb

  • SSDEEP

    3072:lxUjEyceq3/M+DjQDA8DfKrFHasUzFEJWmFezJxs3QrTw81oJRwhHt:gjEyz0/MzJfkZWzmpUV1oL0

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61ac2256a931e259e3978b8731519242_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\61ac2256a931e259e3978b8731519242_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\winlogon.exe" CityScape Enable
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:4944
    • C:\Users\Admin\AppData\Roaming\winlogon.exe
      /d C:\Users\Admin\AppData\Local\Temp\61ac2256a931e259e3978b8731519242_JaffaCakes118.exe
      2⤵
      • Modifies WinLogon for persistence
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\winlogon.exe

    Filesize

    241KB

    MD5

    e776928b6692598b7c4b55675eea15a1

    SHA1

    7a06182100023fb5e919c1b96a65b32859417041

    SHA256

    f8083564c6f2a8e4742fdeb68023436dc2bbd89a854c07860c009d67a06ee9b8

    SHA512

    90ccfa9066191e151d69e116fd70b08ea265d4c0f6bf559816ca39aa46ab4f5fe7aeb2e4b765eee57e7df89f47c286421e984eb638b1258738cf7875599f2597

  • memory/224-25-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/224-28-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/224-29-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/224-30-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/224-33-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/224-37-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/224-40-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3652-0-0x0000000000910000-0x0000000000951000-memory.dmp

    Filesize

    260KB

  • memory/3652-2-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/3652-23-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB