Analysis

  • max time kernel
    10s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 08:39 UTC

Errors

Reason
Machine shutdown

General

  • Target

    89b5a6af73d8a12ac5a0cdf54cf74902_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    89b5a6af73d8a12ac5a0cdf54cf74902

  • SHA1

    cac267f7b772a80ee0b1ef21da3cc073099fd05e

  • SHA256

    2f8fddcf233fdb3152a78b55d738e782c39a5d335a2601d48c2fdab86fa7a4de

  • SHA512

    f47e7968f46dd0ea74f99dcda2f847d40a14c592ddbdb894948fa18eba1e401018f2cc62c482083964dc3154bd0aa44ddf63ad2acb3cda63a0ea103990a4260b

  • SSDEEP

    1536:+UC0ip1IbJSmBXgf4Hba9bFFRVKPEcX38YjMNajoxBgmQB:+XB1UgqsRQEUJMMjofgmQ

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89b5a6af73d8a12ac5a0cdf54cf74902_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\89b5a6af73d8a12ac5a0cdf54cf74902_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:560
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2468
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2932

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/560-1-0x0000000001001000-0x0000000001002000-memory.dmp

        Filesize

        4KB

      • memory/560-2-0x0000000001000000-0x0000000001019000-memory.dmp

        Filesize

        100KB

      • memory/560-0-0x0000000001000000-0x0000000001019000-memory.dmp

        Filesize

        100KB

      • memory/2468-5-0x00000000029C0000-0x00000000029C1000-memory.dmp

        Filesize

        4KB

      • memory/2932-6-0x00000000026E0000-0x00000000026E1000-memory.dmp

        Filesize

        4KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.