Analysis

  • max time kernel
    141s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 06:17

General

  • Target

    f560e1678dc790aaad48c4e867f5761c_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    f560e1678dc790aaad48c4e867f5761c

  • SHA1

    fb5de6af82ae91ab70ef59af0421f9cc2ed60237

  • SHA256

    c824feca55818dbfea829f40dd4b56583a6fd13dbbf04eae56ceef49ea3c96b6

  • SHA512

    fe7df1067ff2431bd4e0741e229ad64d76a401a717458e645358c9db9dd39e5e46fdb41221c5c43b7f2905d393a86c16ec3e9578d0b4d173dd6aa2ad8bf041c0

  • SSDEEP

    24576:3g5pnpTHNOFIfO6sNVs1kZhr4WpzPhc1NC+QwMQGzIc5JXQBTXxN/NdX9R0:Mn0p6gVuwhr4WpIQmGzIPBTHztR

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f560e1678dc790aaad48c4e867f5761c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f560e1678dc790aaad48c4e867f5761c_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\PEAO.CSS

    Filesize

    301B

    MD5

    c0c54f1f7445edb5678f29c49a82e528

    SHA1

    e87c79a8091aa15de20da947137ac019cc8f17e6

    SHA256

    ba2e0bc67a4b95e86423620a34e7aa0e4875db21b7f3aac81a2656254c7c1071

    SHA512

    ca01de920848629de39d1c1942517d23d8a8e004a6a12b34746e9ed2771aa081dccb1d0abbe0ff52ba16ac343f428d385d48677e3b6ac0378ec485db6aa1ecf0

  • memory/2636-0-0x0000000000400000-0x0000000001669000-memory.dmp

    Filesize

    18.4MB

  • memory/2636-1-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/2636-2-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2636-8-0x0000000000400000-0x0000000001669000-memory.dmp

    Filesize

    18.4MB

  • memory/2636-10-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB