Analysis

  • max time kernel
    14s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 07:35

Errors

Reason
Machine shutdown

General

  • Target

    b6d854542d7054fbefd78f0485eed687_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    b6d854542d7054fbefd78f0485eed687

  • SHA1

    e60be8572f8abce7bc689b4ee44122096263b2f1

  • SHA256

    3d7e83ff767e3187bbd691a5253a11abf18db2258210dde30058ad45607819ef

  • SHA512

    0e306b8da799ef9ae2325eb08c4c6dd4421a19f462bd11f702e1abf5394e957b4be7f8147082b8895a9833bff3bcee9008412d4470c228e40d8dfb7dd5723355

  • SSDEEP

    192:uRXIEyIKbdyByVi+IBIXlRUpepMGBKVPNY68rwevx01U7GD1FyreX8erKUOITH7U:OYfmyV0Mc2MIKzbJjNrKqTHkwxOA6

Malware Config

Signatures

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6d854542d7054fbefd78f0485eed687_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b6d854542d7054fbefd78f0485eed687_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:496
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B6D854~1.EXE > nul
      2⤵
        PID:2568
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:2516
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:2852

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2516-0-0x0000000002D90000-0x0000000002D91000-memory.dmp

          Filesize

          4KB

        • memory/2852-1-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

          Filesize

          4KB