Analysis

  • max time kernel
    131s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 09:00

General

  • Target

    6eed3bb731d7fafc6564a82d36e7d4f7_JaffaCakes118.exe

  • Size

    30KB

  • MD5

    6eed3bb731d7fafc6564a82d36e7d4f7

  • SHA1

    94c4829454760bc7a84c3d1caec9c2a3c363554b

  • SHA256

    0fcc8ec62ab1ce7c7f7835da76eeb6a16554c3243dfeb760cbe72f4cef634015

  • SHA512

    76d0e33200799807593cb9bf803fbedd6d4ef765cbe19a12048f5f5472edff0f2fc6286435b73f5a6d0da21c0b9c19788668c3caf24bb6cce0d0c49fdabc264b

  • SSDEEP

    768:o9wUMrsubOJVj4TYHVjSvht8eFGUMo74e3qs134moEilu0:okOJVj4TYAGUB4F23Pp

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\6eed3bb731d7fafc6564a82d36e7d4f7_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\6eed3bb731d7fafc6564a82d36e7d4f7_JaffaCakes118.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Adds Run key to start application
        • Drops desktop.ini file(s)
        • Modifies WinLogon
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4576

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4576-0-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4576-2-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/4576-1-0x00000000009F0000-0x0000000000A05000-memory.dmp

      Filesize

      84KB

    • memory/4576-7-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB