Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 07:18

General

  • Target

    b290b705882849a01b868d2a5026478c_JaffaCakes118.exe

  • Size

    27KB

  • MD5

    b290b705882849a01b868d2a5026478c

  • SHA1

    69137ce7823cf0267d302638a29d216e1c7512a0

  • SHA256

    6ce9422b832068b7efe3caf5d155815d2423a41dc0f8f6a8df8b3193583e3080

  • SHA512

    148fdeab3e16b3ca627c0dabe09e1880d7be2bf4b9b758a49d5120262a280b382aa8d6c08ad37c95e6f112a25a28122b6ceb745975bcea29072354059fb38755

  • SSDEEP

    768:wzFI2QjWQ3zwO+L0mNvjaRziDG/jDQjjmWTe+Hc9WstYQ:GoaAv+L0mNvjaRziDG/jDQjjmW9Hc9hL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b290b705882849a01b868d2a5026478c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b290b705882849a01b868d2a5026478c_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Roaming\app\winlogon.exe.exe
      "C:\Users\Admin\AppData\Roaming\app\winlogon.exe.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\app\winlogon.exe.exe

    Filesize

    27KB

    MD5

    b290b705882849a01b868d2a5026478c

    SHA1

    69137ce7823cf0267d302638a29d216e1c7512a0

    SHA256

    6ce9422b832068b7efe3caf5d155815d2423a41dc0f8f6a8df8b3193583e3080

    SHA512

    148fdeab3e16b3ca627c0dabe09e1880d7be2bf4b9b758a49d5120262a280b382aa8d6c08ad37c95e6f112a25a28122b6ceb745975bcea29072354059fb38755

  • memory/2496-0-0x000007FEF5B93000-0x000007FEF5B94000-memory.dmp

    Filesize

    4KB

  • memory/2496-1-0x0000000001150000-0x000000000115E000-memory.dmp

    Filesize

    56KB

  • memory/3020-7-0x00000000001E0000-0x00000000001EE000-memory.dmp

    Filesize

    56KB

  • memory/3020-9-0x000007FEF5B90000-0x000007FEF657C000-memory.dmp

    Filesize

    9.9MB

  • memory/3020-10-0x000007FEF5B90000-0x000007FEF657C000-memory.dmp

    Filesize

    9.9MB

  • memory/3020-13-0x000007FEF5B90000-0x000007FEF657C000-memory.dmp

    Filesize

    9.9MB

  • memory/3020-15-0x000007FEF5B90000-0x000007FEF657C000-memory.dmp

    Filesize

    9.9MB