Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 12:19

General

  • Target

    ed9288c4b2eb0d793599fbfb0952e7c0_JaffaCakes118.exe

  • Size

    524KB

  • MD5

    ed9288c4b2eb0d793599fbfb0952e7c0

  • SHA1

    7db6387982fae592612948c0f0556ae35b47b309

  • SHA256

    e2ad459d32ba74c7af1551c7b68ed910f723d3fcc97439586b35c475a2834077

  • SHA512

    4111c0d4f82fb0acf84baf773600847b14761c897a36a042cb851b23b7e3f4d63771e01cbef66d50089644c2722fa5926e25aad5f407310cb8eea5a86cbcdf73

  • SSDEEP

    384:c0J/ivHYTyABX2z1u1FiMtNR1+TWjzacP7fsHhWLQPTrLf4jeG4RRf13J4ar+0IL:c0JKwcMjUWjbsIQVFr+0dJU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed9288c4b2eb0d793599fbfb0952e7c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed9288c4b2eb0d793599fbfb0952e7c0_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of AdjustPrivilegeToken
    PID:3640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3640-0-0x00007FF80AB75000-0x00007FF80AB76000-memory.dmp

    Filesize

    4KB

  • memory/3640-1-0x000000001BC20000-0x000000001BCC6000-memory.dmp

    Filesize

    664KB

  • memory/3640-2-0x00007FF80A8C0000-0x00007FF80B261000-memory.dmp

    Filesize

    9.6MB

  • memory/3640-3-0x00007FF80A8C0000-0x00007FF80B261000-memory.dmp

    Filesize

    9.6MB

  • memory/3640-4-0x000000001C1B0000-0x000000001C67E000-memory.dmp

    Filesize

    4.8MB

  • memory/3640-5-0x000000001C7E0000-0x000000001C87C000-memory.dmp

    Filesize

    624KB

  • memory/3640-6-0x000000001C680000-0x000000001C688000-memory.dmp

    Filesize

    32KB

  • memory/3640-7-0x000000001C940000-0x000000001C98C000-memory.dmp

    Filesize

    304KB

  • memory/3640-9-0x00007FF80A8C0000-0x00007FF80B261000-memory.dmp

    Filesize

    9.6MB

  • memory/3640-10-0x00007FF80AB75000-0x00007FF80AB76000-memory.dmp

    Filesize

    4KB

  • memory/3640-11-0x00007FF80A8C0000-0x00007FF80B261000-memory.dmp

    Filesize

    9.6MB

  • memory/3640-12-0x00007FF80A8C0000-0x00007FF80B261000-memory.dmp

    Filesize

    9.6MB

  • memory/3640-13-0x00007FF80A8C0000-0x00007FF80B261000-memory.dmp

    Filesize

    9.6MB