Analysis

  • max time kernel
    6s
  • max time network
    7s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 16:20 UTC

Errors

Reason
Machine shutdown

General

  • Target

    a75a69ff9d2338748278ac82649c3741_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    a75a69ff9d2338748278ac82649c3741

  • SHA1

    e067f9631043b235214d979db89d575bbc7ef8b1

  • SHA256

    2a17a247c3d97ecf71a55a461a144809cc3d0680c24d762d1599b7ef4ffffed7

  • SHA512

    1d1e11af35f75fde8b25ff45b46bd7a36e9a36a34a1240d264328ef1b22bbd4d6e5f81a5010eddde3f68e5f3c3dafbe8943a1ebd5a1c210e110b1bd9e207764a

  • SSDEEP

    1536:hYFGirnk+Eg7km7UKeLncd94Ol7bHUHHkkW2kUlHHHHwAsRMHkI9vxv6sVqOj8FB:hYXk7gLQKmxOhUnuDMnnXsOHkIZxSYqr

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a75a69ff9d2338748278ac82649c3741_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a75a69ff9d2338748278ac82649c3741_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2924
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2632
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2660

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2632-5-0x0000000002D90000-0x0000000002D91000-memory.dmp

        Filesize

        4KB

      • memory/2660-6-0x0000000002B30000-0x0000000002B31000-memory.dmp

        Filesize

        4KB

      • memory/2924-0-0x0000000001000000-0x0000000001018000-memory.dmp

        Filesize

        96KB

      • memory/2924-2-0x0000000001000000-0x0000000001018000-memory.dmp

        Filesize

        96KB

      • memory/2924-1-0x0000000001001000-0x0000000001002000-memory.dmp

        Filesize

        4KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.