Analysis

  • max time kernel
    148s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 23:23

General

  • Target

    d547306a9fe2b6e8d9c67b3d2d30fa86_JaffaCakes118.exe

  • Size

    529KB

  • MD5

    d547306a9fe2b6e8d9c67b3d2d30fa86

  • SHA1

    2e72e74504fa4cc4761027864fe5796bad49bb58

  • SHA256

    a956be80bde1f5b83c1833fd34ab2f98ee25ae6ffce54a67cbee89099f0fab52

  • SHA512

    2f7c4ce5fd5b9057b7554b909168b29f7169ffca09790f74ec3ec79cb8bd62de68587ccd7e8da951b3d03233b59a2bda3cec092443544a2dc541562f97c95d3f

  • SSDEEP

    12288:51bb/fuGCyf9YuXoK+cBe5TuSbHTnFL+kjoPbk+5+I:51brCA9ZYKdBQu6HTFL+kw5n

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d547306a9fe2b6e8d9c67b3d2d30fa86_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d547306a9fe2b6e8d9c67b3d2d30fa86_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:468

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\java-rmi.exe

          Filesize

          75KB

          MD5

          0b37e6ebc5f905b0ffc16c775933f0b8

          SHA1

          c456d32924524b9d5d3fe7029e8ccdce12baa880

          SHA256

          0827d2ca7188534527f1fbd30c5333b8ceeb5a0be8bfa6c5aa26703f2ac54da3

          SHA512

          58fb97ae2e6536660ac589520618696842b9b06b27c7afb7e0231a3d193b955e7f22795129fe8d53ed681e94353bac3e1a16a8763d99dc26bfcdd268c338a5d2

        • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

          Filesize

          529KB

          MD5

          d547306a9fe2b6e8d9c67b3d2d30fa86

          SHA1

          2e72e74504fa4cc4761027864fe5796bad49bb58

          SHA256

          a956be80bde1f5b83c1833fd34ab2f98ee25ae6ffce54a67cbee89099f0fab52

          SHA512

          2f7c4ce5fd5b9057b7554b909168b29f7169ffca09790f74ec3ec79cb8bd62de68587ccd7e8da951b3d03233b59a2bda3cec092443544a2dc541562f97c95d3f

        • memory/468-24-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-25-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-20-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-21-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-22-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-23-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-18-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-19-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-26-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-28-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-29-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-48-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-17-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/468-102-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB