Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 21:58

General

  • Target

    ee80c2511e815b8b9b5c026714815d03_JaffaCakes118.exe

  • Size

    254KB

  • MD5

    ee80c2511e815b8b9b5c026714815d03

  • SHA1

    40ebb9f2086b6cc6b2d1375164f9f02cf29ea184

  • SHA256

    3a03bc925fbddf1b6b623637e61068e5ebc506de5ea525568108189c21c168a9

  • SHA512

    74aa97b40c1ca4e96ddd3c760eab9ce850ddbbf66ebef1af7609c2a484bb7827164635588820a2198bf47454920be7de4ac2012f4b24975a37f5af9af760d764

  • SSDEEP

    6144:LfTnFJpO5yXpIQ1/xn4tNBXXMZbVo6kqMNB2p:LbnvpOQXpLT2NBXXMjUqMNC

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
    • C:\Users\Admin\AppData\Local\Temp\ee80c2511e815b8b9b5c026714815d03_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ee80c2511e815b8b9b5c026714815d03_JaffaCakes118.exe"
      1⤵
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3724
      • C:\Users\Admin\AppData\Local\Temp\ee80c2511e815b8b9b5c026714815d03_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ee80c2511e815b8b9b5c026714815d03_JaffaCakes118.exe"
        2⤵
        • Modifies WinLogon for persistence
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/612-40-0x000000000FA10000-0x000000000FA29000-memory.dmp

      Filesize

      100KB

    • memory/612-75-0x000000000FAF0000-0x000000000FB09000-memory.dmp

      Filesize

      100KB

    • memory/612-29-0x000000000F9D0000-0x000000000F9E9000-memory.dmp

      Filesize

      100KB

    • memory/612-10-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/612-15-0x000000000F970000-0x000000000F989000-memory.dmp

      Filesize

      100KB

    • memory/612-14-0x000000000F970000-0x000000000F989000-memory.dmp

      Filesize

      100KB

    • memory/612-21-0x000000000F990000-0x000000000F9A9000-memory.dmp

      Filesize

      100KB

    • memory/612-79-0x000000000FB10000-0x000000000FB29000-memory.dmp

      Filesize

      100KB

    • memory/612-34-0x000000000F9F0000-0x000000000FA09000-memory.dmp

      Filesize

      100KB

    • memory/612-70-0x000000000FAD0000-0x000000000FAE9000-memory.dmp

      Filesize

      100KB

    • memory/612-28-0x000000000F9B0000-0x000000000F9C9000-memory.dmp

      Filesize

      100KB

    • memory/612-44-0x000000000FA30000-0x000000000FA49000-memory.dmp

      Filesize

      100KB

    • memory/612-49-0x000000000FA50000-0x000000000FA69000-memory.dmp

      Filesize

      100KB

    • memory/612-54-0x000000000FA70000-0x000000000FA89000-memory.dmp

      Filesize

      100KB

    • memory/612-62-0x000000000FA90000-0x000000000FAA9000-memory.dmp

      Filesize

      100KB

    • memory/612-67-0x000000000FAB0000-0x000000000FAC9000-memory.dmp

      Filesize

      100KB

    • memory/2352-2-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/2352-1289-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/2352-0-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/2352-4-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB