Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 15:14

General

  • Target

    8690495d841662b07b347b533fc3cbe7_JaffaCakes118.exe

  • Size

    137KB

  • MD5

    8690495d841662b07b347b533fc3cbe7

  • SHA1

    d9e4cd75284aa4aeaf5d64f9840fc32df30fcd44

  • SHA256

    4a434513c2a3b524e360af750d76df4bcd491b2489323ea13b31a696edb56d71

  • SHA512

    1b1f67c80ac218487ab7b98d0422d15799eb3365ab9b6581b55ab51fc98544c7e588a1df11871bad2d100f1e793cd8c351dece90823702684792bd127dc449fb

  • SSDEEP

    3072:4NLawbPnjIm+BnZeoDRJXQPCT5wnl/fUlaksnff:4NLawjn/2UWRJXQaT5wnl/fUlmf

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Users\Admin\AppData\Local\Temp\8690495d841662b07b347b533fc3cbe7_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8690495d841662b07b347b533fc3cbe7_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3712

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/612-6-0x0000000000400000-0x0000000000417000-memory.dmp

            Filesize

            92KB

          • memory/612-9-0x000000003C6A0000-0x000000003C6B7000-memory.dmp

            Filesize

            92KB

          • memory/612-14-0x000000003C6C0000-0x000000003C6D7000-memory.dmp

            Filesize

            92KB

          • memory/612-20-0x000000003C6E0000-0x000000003C6F7000-memory.dmp

            Filesize

            92KB

          • memory/612-26-0x000000003C700000-0x000000003C717000-memory.dmp

            Filesize

            92KB

          • memory/612-30-0x000000003C720000-0x000000003C737000-memory.dmp

            Filesize

            92KB

          • memory/612-34-0x000000003C740000-0x000000003C757000-memory.dmp

            Filesize

            92KB

          • memory/612-39-0x000000003C760000-0x000000003C777000-memory.dmp

            Filesize

            92KB

          • memory/612-44-0x000000003C780000-0x000000003C797000-memory.dmp

            Filesize

            92KB

          • memory/612-50-0x000000003C7A0000-0x000000003C7B7000-memory.dmp

            Filesize

            92KB

          • memory/612-54-0x000000003C7C0000-0x000000003C7D7000-memory.dmp

            Filesize

            92KB

          • memory/612-61-0x000000003C7E0000-0x000000003C7F7000-memory.dmp

            Filesize

            92KB

          • memory/612-67-0x000000003C800000-0x000000003C817000-memory.dmp

            Filesize

            92KB

          • memory/612-69-0x000000003C820000-0x000000003C837000-memory.dmp

            Filesize

            92KB

          • memory/612-74-0x000000003C840000-0x000000003C857000-memory.dmp

            Filesize

            92KB