Analysis

  • max time kernel
    141s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 13:24

General

  • Target

    edae221e2e7cd186901458e3f722b2e9_JaffaCakes118.exe

  • Size

    104KB

  • MD5

    edae221e2e7cd186901458e3f722b2e9

  • SHA1

    9a3ffc6e56758d5810d0296697b12185885b21c9

  • SHA256

    4d49e580a487e3442735a0dd1e98d1c48c9c5921053889b4d7c900c813672799

  • SHA512

    8df1a69d6aeb4011e39ed636655cba9a5626ccef28ce9afdef7482c1d6027d76b1f04cc0a07685a8e6d64f75ee9155b971f6e66d57f3861ea1fd8d7c100b821b

  • SSDEEP

    3072:X1B31bdBob2QXpEEeJiI2EcVwSk5YXTf7TEZd:X731bdBaBSERVLk5kAd

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edae221e2e7cd186901458e3f722b2e9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\edae221e2e7cd186901458e3f722b2e9_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\jar.exe

    Filesize

    81KB

    MD5

    2c5d24431e488e963fba137ebaf7fa4b

    SHA1

    687b43205e0a62670544ab7d63bc891d1b4d3256

    SHA256

    034c7ef54e3b06f74be6d286be1986ff82f7b38507da2eb11e300d7cad9ac62b

    SHA512

    e609c7485d17ab6adbc58628b71880c96c7ebbb5b6c8d6c007b1a8ad4342b4bd9b01513167bd621a877c0799e207c158c2686fbf1dbaeaacb44468aea972449e

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    930KB

    MD5

    7983825e2e639b0219b433d8034902a6

    SHA1

    cb007b1b64a05d78ad4f0c7fa24aa75c9d5aea0e

    SHA256

    9a91939556dc651f365c2089c0045fd40477071132ba611aa48b8f058d6b069f

    SHA512

    20fa648e2d4e5a96463acfe241b8c1c762280fdc02f58d269808a811661d712a5153d7142e5355693500aa2d75cf6dbf6669364fc4ade112ded7a13fdc504088

  • memory/2308-117-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-118-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-116-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-34-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-119-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-120-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-121-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-122-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-123-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2308-124-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB