Analysis

  • max time kernel
    150s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 04:53

General

  • Target

    c8402784cb27fca3262dbc35c9e51888_JaffaCakes118.exe

  • Size

    106KB

  • MD5

    c8402784cb27fca3262dbc35c9e51888

  • SHA1

    2f9395fc254b5caad16d4deaf75f2721c6ec0bbf

  • SHA256

    1f18c287e3707255f2fc50915407b27c4636de7301a5eb7de6120684e0a19b46

  • SHA512

    072335a63a9cb81f87d2b430a5133982de0e08bc08e52ade057a31dd29138949c7e284ed174c9a29e0a2c934cce24aeae9165b89f764a7f98e18e685ccb1c963

  • SSDEEP

    1536:4aiqH1s+kCtrA2UMT0mTFibDKa1XEFyVIHsGu+a9PxPVvowTf7xpY0EPri:51B31bdBob2QX8yOHBu39P1VvowxGHP2

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8402784cb27fca3262dbc35c9e51888_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c8402784cb27fca3262dbc35c9e51888_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    930KB

    MD5

    22a73760b447eefbedc7e5f33b965494

    SHA1

    b6c8359fe8bb982e46b05dea8378be344767a12b

    SHA256

    ec0d30098065a4e2c2d192d0899507e655f158c0a1e747053e2e38d561316d02

    SHA512

    7960ccaf47fcb1091f2d01cb959bad30b70591e47ae151d16482357975e4e672f23a6a37e62b078f47b941591f28bfba26eefec58ef91a10d6a51544aba9f118

  • memory/876-19-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-20-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-21-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-22-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-23-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-24-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-25-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-26-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-27-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-29-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-30-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-52-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-59-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-91-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/876-92-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB