Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 17:47

General

  • Target

    fcd3b4855039e3b882d1f6be8e72279e_JaffaCakes118.exe

  • Size

    463KB

  • MD5

    fcd3b4855039e3b882d1f6be8e72279e

  • SHA1

    144162a851860f353a46493c6adb145660821a26

  • SHA256

    5bcbc87234a5aa312167b90ce0b24620f45a582ef4cfda460159cda52e51033f

  • SHA512

    0843258c1e1ced040635e2e27887eed17616fa8056b6f45d956c52225a5688602a2b005c56e7726ef702795fd28e66629552bdce6cec0f7f6bab664247cb6ee6

  • SSDEEP

    12288:rk8NlyiAifIV2RyVCuoYmRLinrpitQS9kRSe60yHRiiGGDrzG8VS8:5lzfluCfHsiCYkRU0s/Q8

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:624
    • C:\Users\Admin\AppData\Local\Temp\fcd3b4855039e3b882d1f6be8e72279e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\fcd3b4855039e3b882d1f6be8e72279e_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2096
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:8
      1⤵
        PID:4532

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/624-49-0x000000000D2E0000-0x000000000D2F6000-memory.dmp

        Filesize

        88KB

      • memory/624-85-0x000000000D3C0000-0x000000000D3D6000-memory.dmp

        Filesize

        88KB

      • memory/624-7-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/624-12-0x000000000D200000-0x000000000D216000-memory.dmp

        Filesize

        88KB

      • memory/624-16-0x000000000D220000-0x000000000D236000-memory.dmp

        Filesize

        88KB

      • memory/624-24-0x000000000D240000-0x000000000D256000-memory.dmp

        Filesize

        88KB

      • memory/624-26-0x000000000D260000-0x000000000D276000-memory.dmp

        Filesize

        88KB

      • memory/624-39-0x000000000D2A0000-0x000000000D2B6000-memory.dmp

        Filesize

        88KB

      • memory/624-91-0x000000000D400000-0x000000000D416000-memory.dmp

        Filesize

        88KB

      • memory/624-86-0x000000000D3E0000-0x000000000D3F6000-memory.dmp

        Filesize

        88KB

      • memory/624-31-0x000000000D280000-0x000000000D296000-memory.dmp

        Filesize

        88KB

      • memory/624-51-0x000000000D300000-0x000000000D316000-memory.dmp

        Filesize

        88KB

      • memory/624-59-0x000000000D320000-0x000000000D336000-memory.dmp

        Filesize

        88KB

      • memory/624-61-0x000000000D340000-0x000000000D356000-memory.dmp

        Filesize

        88KB

      • memory/624-69-0x000000000D360000-0x000000000D376000-memory.dmp

        Filesize

        88KB

      • memory/624-71-0x000000000D380000-0x000000000D396000-memory.dmp

        Filesize

        88KB

      • memory/624-76-0x000000000D3A0000-0x000000000D3B6000-memory.dmp

        Filesize

        88KB

      • memory/624-45-0x000000000D2C0000-0x000000000D2D6000-memory.dmp

        Filesize

        88KB

      • memory/2096-1-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2096-0-0x0000000000690000-0x00000000006A2000-memory.dmp

        Filesize

        72KB