Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:19

General

  • Target

    eabf439a5bc49eec0ca32278e7673311_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    eabf439a5bc49eec0ca32278e7673311

  • SHA1

    312a1c4e37a96f4507f8b3075784e957b7155755

  • SHA256

    58e19d3ea468ed30dbf7d2b84186a3276eb8263b701f67d7255435f9fa0edc68

  • SHA512

    b82223462f7d034245330bbbf6ce701da5fdd8040abd94e31aa27f4bd296454a565fb6b2ddebe28ed2d7d33a11f9d2dadd813bdbd2e4a71a022644260f313f6b

  • SSDEEP

    768:PTAm5hiTllzeF/AJOTmbWa8RYdiU3/7Shy5nv9/tw/xmcQM/:PLIcNTcWATPuhI9a/x4w

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eabf439a5bc49eec0ca32278e7673311_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eabf439a5bc49eec0ca32278e7673311_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Windows\Explorer.exe
      C:\Windows\Explorer.exe
      2⤵
      • Modifies registry class
      PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Microsoft 0ffice.pif

    Filesize

    38KB

    MD5

    d6a4b122f28f28a53453cf02674ac574

    SHA1

    d911203c1db23b8bfdb92ef6f511a872c2e2d7e1

    SHA256

    988d13d7979287206f7f608a878da8f71023f64a27736b6a2412523e9d281ab7

    SHA512

    d3f717641643e07e48e7444bb5aeaeaa7d7c357cb65492f63458cb77b25ab9c34b53d5d8dbec4ad2678c57659fa8149322391f0862112292ac00415ccca4e75e

  • memory/3372-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3372-1-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/3372-30-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3372-31-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/3372-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3372-42-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB