Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 12:56

General

  • Target

    b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe

  • Size

    182KB

  • MD5

    b389face833ea8e03cd134b6b3e061d3

  • SHA1

    59033e2a0f173a2e523368db10139e1f4059dba6

  • SHA256

    74cb115c00d95ad8b9d31498252638036f0117776dc81698e85e18b59d8d7bd6

  • SHA512

    0f942c058549f20535f52489f454ccd85753968a10193a0fc00257b593ef4ef849fb46ca1924e9bc7c410352e2749045b8f20b85e922a34096c5a6ebc26fb6bb

  • SSDEEP

    3072:YrOscJZSn/s5UiJSCtkOMP3vZpCIcArNS+h3FtqaZS8aQA50Ax8KUsZOepqoY:rqs5Ugg3vZpvrpZP4dQAy+8KUOOes

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:2212
      • C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\b389face833ea8e03cd134b6b3e061d3_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:2156

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\58BC.7CC

        Filesize

        1KB

        MD5

        b06583e02ece7182e7517ce552079411

        SHA1

        46c78b659b64d4a2c3f4fd05c9d7e734578c89a4

        SHA256

        bf3b9b5545439a6917e79eba1a2ab5cc832b6fd77bf207100f1f3ff231f696e2

        SHA512

        e7def45cad358237fafff383be491886006c6a68321ffd509dc18a6fa5a81687afd358ae154910522b644cc8702ef93aaf87acf0f26e30cdf29070b0458c213c

      • C:\Users\Admin\AppData\Roaming\58BC.7CC

        Filesize

        600B

        MD5

        2e87cdee2e5f49e315423ae7f0415dc8

        SHA1

        35b6333098ce698abf225bffe5cb719da9447837

        SHA256

        6e0f11dd31e1b565115d5b8cf8cbcf5968d68cde6b9ef23ca51f71d6cef34782

        SHA512

        c4cc0599a5480d859c75cf45beb8d72b98c5f442dfa986802fec62edf72f1c71c850cc29433f290bb5b8ca774b9d3dc0c892b9c5e36758fb0d855beb8d9c1ca0

      • C:\Users\Admin\AppData\Roaming\58BC.7CC

        Filesize

        996B

        MD5

        026507a9857847d11fe7d04c6bf7605e

        SHA1

        a1baea093c396a0ca53d14244891462a57b57cb5

        SHA256

        b9d7bb288f78f6b8b682deb4b4c7eb6b53aa0bcfa4977a9a41a66f747e512702

        SHA512

        4807529d469e5a55dcadf1da8ef355196124b2966896387e7b33ac91b416eff09478629d9317b5b6ea92cc10afbac58a07ff7ef6c329888660ae65f4239ff79a

      • memory/1120-16-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1120-84-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1120-1-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1120-2-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1120-193-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1120-194-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2156-83-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2212-13-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2212-15-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2212-12-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB