Analysis

  • max time kernel
    91s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 03:01

General

  • Target

    df5f112954d2ff8cbc90c66f99351834_JaffaCakes118.exe

  • Size

    59KB

  • MD5

    df5f112954d2ff8cbc90c66f99351834

  • SHA1

    514ef0cd06886741e75499919fba4bd951772fd2

  • SHA256

    e32b6b3c2364fed1e2413281d7b5bd174d41d5d8427e779f9e5ce6cbd7eb6991

  • SHA512

    c5dd00b70a3d0f7025094a18d3094013ff8a918a61bbd20f5a7c78456aa7fa165a1e361ef5b883f909d25e5377ce4e1b3516c91d356d2d572e005c3b0e801ee8

  • SSDEEP

    1536:B3+qlYYDTAyXP51CF/qvDjpEdqVxnkEmg+Wkk8fW2L:B3NYuA1GpgqH+Xk8f/

Malware Config

Signatures

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df5f112954d2ff8cbc90c66f99351834_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\df5f112954d2ff8cbc90c66f99351834_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Windows\bfsvc.exe
      C:\Windows\bfsvc.exe
      2⤵
        PID:4988
      • C:\Windows\bfsvc.exe
        C:\Windows\bfsvc.exe
        2⤵
          PID:3188

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3532-0-0x0000000000580000-0x0000000000585000-memory.dmp

              Filesize

              20KB

            • memory/3532-1-0x0000000000400000-0x0000000000413D27-memory.dmp

              Filesize

              79KB

            • memory/3532-2-0x000000006B800000-0x000000006B8F0000-memory.dmp

              Filesize

              960KB

            • memory/3532-14-0x0000000000401000-0x0000000000412000-memory.dmp

              Filesize

              68KB

            • memory/3532-18-0x0000000000400000-0x0000000000413D27-memory.dmp

              Filesize

              79KB

            • memory/3532-19-0x0000000000401000-0x0000000000412000-memory.dmp

              Filesize

              68KB