Analysis

  • max time kernel
    150s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 09:16

General

  • Target

    a635b5069a38aeb28b374243fcf0bba2_JaffaCakes118.exe

  • Size

    48KB

  • MD5

    a635b5069a38aeb28b374243fcf0bba2

  • SHA1

    9a738172b56285e247103fabe0c52bc2e573b251

  • SHA256

    687d244f0b996a57b1e7876c131cad886d2c9d6cc842d6dbfb74facf109a7403

  • SHA512

    cbdf4cec803ee495d7dc6b5f315e9c5c9b7e80ea0989500d4801c3ebe02fbccc28c12456896b21dd630f9a2c416d91d9a56afa6f5d9d293ed20c5f67016952f6

  • SSDEEP

    1536:v+BFaf9e5nfifvVSogKDs7h6m8ZM+McdoXtK:CFoQ5nfifNSOY7h6m8bkXtK

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Users\Admin\AppData\Local\Temp\a635b5069a38aeb28b374243fcf0bba2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a635b5069a38aeb28b374243fcf0bba2_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4676

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/612-34-0x0000000028830000-0x0000000028855000-memory.dmp

            Filesize

            148KB

          • memory/612-50-0x00000000288C0000-0x00000000288E5000-memory.dmp

            Filesize

            148KB

          • memory/612-74-0x00000000289B0000-0x00000000289D5000-memory.dmp

            Filesize

            148KB

          • memory/612-69-0x0000000028980000-0x00000000289A5000-memory.dmp

            Filesize

            148KB

          • memory/612-64-0x0000000028950000-0x0000000028975000-memory.dmp

            Filesize

            148KB

          • memory/612-10-0x0000000000400000-0x0000000000425000-memory.dmp

            Filesize

            148KB

          • memory/612-15-0x0000000028770000-0x0000000028795000-memory.dmp

            Filesize

            148KB

          • memory/612-19-0x00000000287A0000-0x00000000287C5000-memory.dmp

            Filesize

            148KB

          • memory/612-29-0x0000000028800000-0x0000000028825000-memory.dmp

            Filesize

            148KB

          • memory/612-59-0x0000000028920000-0x0000000028945000-memory.dmp

            Filesize

            148KB

          • memory/612-44-0x0000000028890000-0x00000000288B5000-memory.dmp

            Filesize

            148KB

          • memory/612-39-0x0000000028860000-0x0000000028885000-memory.dmp

            Filesize

            148KB

          • memory/612-54-0x00000000288F0000-0x0000000028915000-memory.dmp

            Filesize

            148KB

          • memory/612-27-0x00000000287D0000-0x00000000287F5000-memory.dmp

            Filesize

            148KB

          • memory/4676-0-0x0000000000400000-0x0000000000425000-memory.dmp

            Filesize

            148KB

          • memory/4676-1-0x0000000000400000-0x0000000000425000-memory.dmp

            Filesize

            148KB

          • memory/4676-4-0x0000000000400000-0x0000000000425000-memory.dmp

            Filesize

            148KB

          • memory/4676-3-0x0000000000400000-0x0000000000425000-memory.dmp

            Filesize

            148KB

          • memory/4676-2-0x0000000000410000-0x0000000000412000-memory.dmp

            Filesize

            8KB

          • memory/4676-1444-0x0000000000410000-0x0000000000412000-memory.dmp

            Filesize

            8KB