Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 20:44

General

  • Target

    ac831b608810802a554b79d7b76db868_JaffaCakes118.dll

  • Size

    174KB

  • MD5

    ac831b608810802a554b79d7b76db868

  • SHA1

    488042b6b6489247bac9ccdfbefb6f56605ef2f8

  • SHA256

    35b29d5619a8a6236368df256d172a8ffa4b4484c8cb74667c36d1917cc51f71

  • SHA512

    4e951d1935f128eca13ca30da3c21176c8ec7baa0f70b8f39b09e7c325bc8273d3095ce8872c5a04eb0550a5d6d164408984806c2dccfeaeb68bd99cfd58f53a

  • SSDEEP

    3072:MZtFthhaiuwQpDG71TjP+ZbcuOeNtuLDdzoWeh9km+TxhVGSSXZam70ZYB1:wFth+wQs71xEtYdzoWK9km+TvVGBak

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ac831b608810802a554b79d7b76db868_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ac831b608810802a554b79d7b76db868_JaffaCakes118.dll,#1
      2⤵
      • Modifies WinLogon for persistence
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\mywinsys.ini

    Filesize

    25B

    MD5

    fab1f912897143d573511e1602d263ea

    SHA1

    f75f5c5b9604d51c8705b26798f3341ba005827e

    SHA256

    a162cf8a97d899153eff9fd4c9ff8f23cc62b7a82f9bce5ff0d199949e41fbdc

    SHA512

    c3b1c137bed3a8d566353009921d235f38e786043acdd938d1f848d0a0220f65c7cf4301ed49fabebdcb1de9505ef5d61b8496ebb9f83e6d553e1aa819c6e2c7

  • memory/2332-0-0x00000000001A0000-0x00000000001D1000-memory.dmp

    Filesize

    196KB

  • memory/2332-12-0x00000000001A0000-0x00000000001D1000-memory.dmp

    Filesize

    196KB