Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 05:04

General

  • Target

    ece4b7bfe469bf0f30029bcbcf9bb520_JaffaCakes118.exe

  • Size

    472KB

  • MD5

    ece4b7bfe469bf0f30029bcbcf9bb520

  • SHA1

    adf241afb85aa339a4037e4d1645042a810c5e8e

  • SHA256

    536277b88cc12f7ceba1b706209cbd49ad8ac4bb6530c20c5afbb2f116ff9750

  • SHA512

    7274c260558a194d63b70e23d6464bcf9b852207f66a09da4d3551131f70cc6414a335080e556e4ccb986f3bdd7ffbeae4e6e702a7c752c209d603b18f16248e

  • SSDEEP

    6144:mPhmDTfL0IPDnlI1iTNndjjRrJlybvOIEbuUkblgqp5kAUk/:aqTQIblmsHRrJlyb2IEbubbvnUk/

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ece4b7bfe469bf0f30029bcbcf9bb520_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ece4b7bfe469bf0f30029bcbcf9bb520_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      C:\Users\Admin\AppData\Local\Temp\tmp.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies firewall policy service
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe

    Filesize

    220KB

    MD5

    cada83db12edf977fda95c15c9e0db09

    SHA1

    a5820e6b2bfc7d58054781ea4b3007dadcdec59b

    SHA256

    a5ac2a3fc57336eb15032472a443b46d25e6e161ebdcb100740d773908065e1a

    SHA512

    08e0ec5a55d394c3f1eef87c079d652b991b29bf43d7e85df5f2b2bf7a094eaa355ec9099026988ff4cf7a71b56aed55fb38c58f3ddeec2004061b8b970683bf

  • memory/2260-0-0x00007FFB52195000-0x00007FFB52196000-memory.dmp

    Filesize

    4KB

  • memory/2260-1-0x000000001BF10000-0x000000001BFB6000-memory.dmp

    Filesize

    664KB

  • memory/2260-2-0x00007FFB51EE0000-0x00007FFB52881000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-3-0x00007FFB51EE0000-0x00007FFB52881000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-4-0x000000001C490000-0x000000001C95E000-memory.dmp

    Filesize

    4.8MB

  • memory/2260-5-0x000000001CA50000-0x000000001CAEC000-memory.dmp

    Filesize

    624KB

  • memory/2260-6-0x0000000001900000-0x0000000001908000-memory.dmp

    Filesize

    32KB

  • memory/2260-7-0x000000001CBB0000-0x000000001CBFC000-memory.dmp

    Filesize

    304KB

  • memory/2260-19-0x00007FFB51EE0000-0x00007FFB52881000-memory.dmp

    Filesize

    9.6MB