Analysis

  • max time kernel
    8s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 12:45

Errors

Reason
Machine shutdown

General

  • Target

    eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe

  • Size

    516KB

  • MD5

    eb5cf6d6717307d5eaa965b807a9e240

  • SHA1

    e56aa07a1eb81ddd675fe48576154a63fac0e856

  • SHA256

    ec9bb94c88b9c00457beacc9e8d7908dcaf1509b2e3fc9f9a6fd4c6bb5820aa2

  • SHA512

    dd8b89ed71d68d093429760b4574f738cf5afe6f31ccad74f33eb012374b2fcb194fbeb5165c1d1b2811fc76ac0d102b697dae7ced3ca8f2e04a35dbf2559e3c

  • SSDEEP

    12288:mtT+tYipsDYmltm6YXh3Y9ta/E7fFjcnffTtYfrWKB1yAQkWqgWzoV:lmMWt1YBCNdjcnf76jZB8AQg8

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb5cf6d6717307d5eaa965b807a9e240_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2440
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2192
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:3040

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2192-6-0x0000000002D90000-0x0000000002D91000-memory.dmp

        Filesize

        4KB

      • memory/2440-0-0x0000000000400000-0x0000000000591000-memory.dmp

        Filesize

        1.6MB

      • memory/2440-1-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/2440-5-0x0000000000400000-0x0000000000591000-memory.dmp

        Filesize

        1.6MB

      • memory/3040-7-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

        Filesize

        4KB