Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 22:12

General

  • Target

    d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe

  • Size

    417KB

  • MD5

    d52dbf52bc8e1de03c0d5f385ad452e5

  • SHA1

    0e3bcf676954ebf650fb57c3367024eedc751e9d

  • SHA256

    66dc7207e5826405c21953aca02b97e20b19b9b34f4f2f673321ef5b76ad1e28

  • SHA512

    ec0ee8a5cad85c6a4d01537181dbfcb4633cd6fdb5a794bc0e492655583528e8d49c5543f2d7010d6f22271ec0cfee075b098d0ed5074bf1b5865ec9d75c7f56

  • SSDEEP

    12288:T3ClbYuGxp2Nx+bj5JVnC04yOarNPT55HpBQFp:TSlbYuGxp2NSjnVnj5OaJPN5HIb

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d52dbf52bc8e1de03c0d5f385ad452e5_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious behavior: EnumeratesProcesses
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2648-0-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2648-1-0x0000000001C10000-0x0000000001C70000-memory.dmp

    Filesize

    384KB

  • memory/2648-2-0x0000000001E00000-0x0000000001E01000-memory.dmp

    Filesize

    4KB

  • memory/2648-3-0x0000000001E20000-0x0000000001E21000-memory.dmp

    Filesize

    4KB

  • memory/2648-9-0x00000000030F0000-0x00000000030F2000-memory.dmp

    Filesize

    8KB

  • memory/2648-8-0x0000000003100000-0x0000000003101000-memory.dmp

    Filesize

    4KB

  • memory/2648-7-0x0000000001D90000-0x0000000001D91000-memory.dmp

    Filesize

    4KB

  • memory/2648-6-0x0000000001E10000-0x0000000001E11000-memory.dmp

    Filesize

    4KB

  • memory/2648-5-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

    Filesize

    4KB

  • memory/2648-4-0x0000000001DB0000-0x0000000001DB1000-memory.dmp

    Filesize

    4KB

  • memory/2648-10-0x0000000003220000-0x000000000323E000-memory.dmp

    Filesize

    120KB

  • memory/2648-12-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2648-14-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2648-11-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2648-13-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2648-19-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2648-20-0x0000000001C10000-0x0000000001C70000-memory.dmp

    Filesize

    384KB

  • memory/2648-21-0x0000000003220000-0x000000000323E000-memory.dmp

    Filesize

    120KB

  • memory/2648-22-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB