Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 17:16

General

  • Target

    b4546a42cc714136510da7aa65c8c14c_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    b4546a42cc714136510da7aa65c8c14c

  • SHA1

    f95c63027979f565fbcc04cf68a090c55839e4d9

  • SHA256

    386f5d05c093ae0857735573ccdd1cb42f510802b74f38a8d157a2930f651af6

  • SHA512

    4e380def7b2074afd63ea7cae7eb67d4b49ae58250f688bd7c8dd8386cdd5dde3a3396a979354d8d0855431ab2a99e95b19c10f9f984eead909161d48497f493

  • SSDEEP

    1536:4aiqH1s+kCtrA2UMT0mTFibDKa1XEnEEiRDmcrf4pvBbXwV3M:51B31bdBob2QXrRCwAlAV3M

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4546a42cc714136510da7aa65c8c14c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b4546a42cc714136510da7aa65c8c14c_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXAC67.tmp

    Filesize

    62KB

    MD5

    c28efdd834ed453de90e550a8052f4b6

    SHA1

    1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

    SHA256

    ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

    SHA512

    650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    88KB

    MD5

    b4546a42cc714136510da7aa65c8c14c

    SHA1

    f95c63027979f565fbcc04cf68a090c55839e4d9

    SHA256

    386f5d05c093ae0857735573ccdd1cb42f510802b74f38a8d157a2930f651af6

    SHA512

    4e380def7b2074afd63ea7cae7eb67d4b49ae58250f688bd7c8dd8386cdd5dde3a3396a979354d8d0855431ab2a99e95b19c10f9f984eead909161d48497f493

  • memory/2980-103-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-104-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-99-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-100-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-101-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-102-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-97-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-98-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-105-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-106-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-107-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-108-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-109-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2980-110-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB