Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 05:25

General

  • Target

    ba846c44d51e217a9f918e985f211ed2_JaffaCakes118.exe

  • Size

    141KB

  • MD5

    ba846c44d51e217a9f918e985f211ed2

  • SHA1

    109f7ed44a53421ec2f726ef26c56b061ddb6c4f

  • SHA256

    c88d5acdc46e298903dcdf51a2702767c6b6dff864fbd8ccf42b225891a7b2df

  • SHA512

    a4a1bd28f9c6a65259038d7f3e721ee68d99c36156819a62c9426ce9f2cf5b6fe5dbf777146f845ed09e8fbdaab453119d48e932b543958dce05b9f299685720

  • SSDEEP

    3072:rZw7h3avGPhYpkgxGmeBvJmoeJAjsr5neowiQdm9/0yTs0:9w7hKvFGmyBUasrAowi9/7TZ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Users\Admin\AppData\Local\Temp\ba846c44d51e217a9f918e985f211ed2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ba846c44d51e217a9f918e985f211ed2_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4880

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/616-28-0x0000000021FA0000-0x0000000021FC8000-memory.dmp

            Filesize

            160KB

          • memory/616-38-0x0000000022000000-0x0000000022028000-memory.dmp

            Filesize

            160KB

          • memory/616-74-0x0000000022150000-0x0000000022178000-memory.dmp

            Filesize

            160KB

          • memory/616-36-0x0000000021FD0000-0x0000000021FF8000-memory.dmp

            Filesize

            160KB

          • memory/616-8-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/616-13-0x0000000021F10000-0x0000000021F38000-memory.dmp

            Filesize

            160KB

          • memory/616-18-0x0000000021F40000-0x0000000021F68000-memory.dmp

            Filesize

            160KB

          • memory/616-24-0x0000000021F70000-0x0000000021F98000-memory.dmp

            Filesize

            160KB

          • memory/616-68-0x0000000022120000-0x0000000022148000-memory.dmp

            Filesize

            160KB

          • memory/616-63-0x00000000220F0000-0x0000000022118000-memory.dmp

            Filesize

            160KB

          • memory/616-58-0x00000000220C0000-0x00000000220E8000-memory.dmp

            Filesize

            160KB

          • memory/616-43-0x0000000022030000-0x0000000022058000-memory.dmp

            Filesize

            160KB

          • memory/616-48-0x0000000022060000-0x0000000022088000-memory.dmp

            Filesize

            160KB

          • memory/616-54-0x0000000022090000-0x00000000220B8000-memory.dmp

            Filesize

            160KB

          • memory/4880-3-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/4880-0-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/4880-1-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/4880-2-0x0000000000411000-0x0000000000414000-memory.dmp

            Filesize

            12KB

          • memory/4880-1453-0x0000000000411000-0x0000000000414000-memory.dmp

            Filesize

            12KB