Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 12:25

General

  • Target

    9617923cee4f84a52dd16a1d6c1b7176_JaffaCakes118.exe

  • Size

    51KB

  • MD5

    9617923cee4f84a52dd16a1d6c1b7176

  • SHA1

    5d82400ee6220c3d69ffc335889ee039e576fbae

  • SHA256

    bfb01a0dbf7558484cbd254a2d432fa6bf3d595fa7ccd719101219fa4f28fb61

  • SHA512

    43ce27728d2268bdf0db42b2633d9ecec13c2589acdad8f07f9270f3bcb143c0c35da23ac843b2ebaa3847517049d719b4bbbe55f7905ce84217f12becc9d6ed

  • SSDEEP

    1536:xIZ5MtjVLXhrIEe9aCVhd5q2gwsWlKeaY:xIZ5MtZLXhrIEeaoAY

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
    • C:\Users\Admin\AppData\Local\Temp\9617923cee4f84a52dd16a1d6c1b7176_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\9617923cee4f84a52dd16a1d6c1b7176_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/620-28-0x000000001FE90000-0x000000001FEB8000-memory.dmp

      Filesize

      160KB

    • memory/620-54-0x000000001FF80000-0x000000001FFA8000-memory.dmp

      Filesize

      160KB

    • memory/620-34-0x000000001FEC0000-0x000000001FEE8000-memory.dmp

      Filesize

      160KB

    • memory/620-73-0x0000000020040000-0x0000000020068000-memory.dmp

      Filesize

      160KB

    • memory/620-9-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/620-13-0x000000001FE00000-0x000000001FE28000-memory.dmp

      Filesize

      160KB

    • memory/620-19-0x000000001FE30000-0x000000001FE58000-memory.dmp

      Filesize

      160KB

    • memory/620-23-0x000000001FE60000-0x000000001FE88000-memory.dmp

      Filesize

      160KB

    • memory/620-68-0x0000000020010000-0x0000000020038000-memory.dmp

      Filesize

      160KB

    • memory/620-63-0x000000001FFE0000-0x0000000020008000-memory.dmp

      Filesize

      160KB

    • memory/620-43-0x000000001FF20000-0x000000001FF48000-memory.dmp

      Filesize

      160KB

    • memory/620-41-0x000000001FEF0000-0x000000001FF18000-memory.dmp

      Filesize

      160KB

    • memory/620-48-0x000000001FF50000-0x000000001FF78000-memory.dmp

      Filesize

      160KB

    • memory/620-58-0x000000001FFB0000-0x000000001FFD8000-memory.dmp

      Filesize

      160KB

    • memory/3396-1-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3396-3745-0x0000000000411000-0x0000000000414000-memory.dmp

      Filesize

      12KB

    • memory/3396-3-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3396-2-0x0000000000411000-0x0000000000414000-memory.dmp

      Filesize

      12KB

    • memory/3396-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB