Analysis

  • max time kernel
    150s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 23:13

General

  • Target

    ee9de528f112ff7db15b4d67e2523d4d_JaffaCakes118.exe

  • Size

    44KB

  • MD5

    ee9de528f112ff7db15b4d67e2523d4d

  • SHA1

    783701447be1bb1893778bcabf51b3f34ff2d8b5

  • SHA256

    14ce8a2aa567a9b36f391a36b1773abd943b5b388d06ba9a87182126bb32bde2

  • SHA512

    dfcec730155c48664a3e15cdd782fcd0fe77bf6f69a719fed9f146627a3c759eee053808606d86aa877ddc496e52b01ec407eab78f2e36f99d50904fcefb4a51

  • SSDEEP

    768:vYxe62cX1j1TwNXGQR8sgxZqAKiXcdTg2PViKON8fBpyofPxRybdacCrLdl/ml:vrJc91TOGQR89xGiQTtPVSN8fBpyuCaY

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
    • C:\Users\Admin\AppData\Local\Temp\ee9de528f112ff7db15b4d67e2523d4d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ee9de528f112ff7db15b4d67e2523d4d_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4356

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/608-36-0x0000000028710000-0x0000000028734000-memory.dmp

      Filesize

      144KB

    • memory/608-65-0x0000000028860000-0x0000000028884000-memory.dmp

      Filesize

      144KB

    • memory/608-41-0x0000000028740000-0x0000000028764000-memory.dmp

      Filesize

      144KB

    • memory/608-84-0x0000000028950000-0x0000000028974000-memory.dmp

      Filesize

      144KB

    • memory/608-8-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/608-13-0x00000000285F0000-0x0000000028614000-memory.dmp

      Filesize

      144KB

    • memory/608-17-0x0000000028620000-0x0000000028644000-memory.dmp

      Filesize

      144KB

    • memory/608-22-0x0000000028650000-0x0000000028674000-memory.dmp

      Filesize

      144KB

    • memory/608-25-0x0000000028680000-0x00000000286A4000-memory.dmp

      Filesize

      144KB

    • memory/608-30-0x00000000286B0000-0x00000000286D4000-memory.dmp

      Filesize

      144KB

    • memory/608-29-0x00000000286B0000-0x00000000286D4000-memory.dmp

      Filesize

      144KB

    • memory/608-33-0x00000000286E0000-0x0000000028704000-memory.dmp

      Filesize

      144KB

    • memory/608-80-0x0000000028920000-0x0000000028944000-memory.dmp

      Filesize

      144KB

    • memory/608-77-0x00000000288F0000-0x0000000028914000-memory.dmp

      Filesize

      144KB

    • memory/608-75-0x00000000288C0000-0x00000000288E4000-memory.dmp

      Filesize

      144KB

    • memory/608-49-0x00000000287A0000-0x00000000287C4000-memory.dmp

      Filesize

      144KB

    • memory/608-53-0x00000000287D0000-0x00000000287F4000-memory.dmp

      Filesize

      144KB

    • memory/608-56-0x0000000028800000-0x0000000028824000-memory.dmp

      Filesize

      144KB

    • memory/608-61-0x0000000028830000-0x0000000028854000-memory.dmp

      Filesize

      144KB

    • memory/608-74-0x00000000288C0000-0x00000000288E4000-memory.dmp

      Filesize

      144KB

    • memory/608-70-0x0000000028890000-0x00000000288B4000-memory.dmp

      Filesize

      144KB

    • memory/608-45-0x0000000028770000-0x0000000028794000-memory.dmp

      Filesize

      144KB

    • memory/4356-1-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4356-1156-0x0000000000410000-0x0000000000412000-memory.dmp

      Filesize

      8KB

    • memory/4356-2-0x0000000000410000-0x0000000000412000-memory.dmp

      Filesize

      8KB

    • memory/4356-3-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/4356-0-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB