Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 15:28

General

  • Target

    afc6962f57f8febb1409dc22229d48b0_JaffaCakes118.exe

  • Size

    81KB

  • MD5

    afc6962f57f8febb1409dc22229d48b0

  • SHA1

    c5cf04d09a199ef8c66e9ccff65716b2c8cad6d5

  • SHA256

    8c4bae4a3f3fe8fad1e8d269183ba7836846f5421972698b6bb9d578138013c4

  • SHA512

    2b4358bc8b0d00f7b082b7b6d4b596a34c61f8f399ef81634f6d8b957eb014bbc4073bbf262164768b77e0d3176c47739de2bc34f06a6333d41678c9b5bed661

  • SSDEEP

    1536:4aiqH1s+kCtrA2UMT0mTFibDKa1XEnKGd+jBBilJS7a8:51B31bdBob2QXGdtQ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\afc6962f57f8febb1409dc22229d48b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\afc6962f57f8febb1409dc22229d48b0_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXA427.tmp

    Filesize

    62KB

    MD5

    c28efdd834ed453de90e550a8052f4b6

    SHA1

    1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

    SHA256

    ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

    SHA512

    650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    683KB

    MD5

    c053139794419b3358380b853b6c3c00

    SHA1

    de6b13e54802c4bbb5c7bdc83fde77e49828f7f0

    SHA256

    e6a67f0c49714ae3aa26753cb07cc5743fd5ab2c10a2ddc90afcf2ed54f1b590

    SHA512

    4a78b719d3430149ba891c8719cca752b3f8049cd561988970c2355f7b72e10f09d55df77f49bfec9ab197f3be65befe6e338d751df164dd968cdcda9d3fe56e

  • memory/3484-22-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-23-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-18-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-19-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-20-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-21-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-16-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-17-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-24-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-26-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-27-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-50-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-15-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3484-99-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB