Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 00:04

General

  • Target

    fd695c7d61141f28d3888edacbec731f_JaffaCakes118.exe

  • Size

    82KB

  • MD5

    fd695c7d61141f28d3888edacbec731f

  • SHA1

    3553c57bbd4e50631772039ee2bb443f3e74b03c

  • SHA256

    b1e94799a6524af432cbea7a298af403551b2453d432b2307589fb2ec8dfbb3e

  • SHA512

    0c2437c6a5fe0f7d018c646245fd3d19a928a87c0a61fb982663594edfc628d2b9416651a77cd14be9279d1066987b388b3d65b664882b4c360122110e291370

  • SSDEEP

    1536:4aiqH1s+kCtrA2UMT0mTFibDKa1XE1g3vqY7:51B31bdBob2QXZvz

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd695c7d61141f28d3888edacbec731f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd695c7d61141f28d3888edacbec731f_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXE9C5.tmp

    Filesize

    62KB

    MD5

    c28efdd834ed453de90e550a8052f4b6

    SHA1

    1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

    SHA256

    ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

    SHA512

    650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    82KB

    MD5

    fd695c7d61141f28d3888edacbec731f

    SHA1

    3553c57bbd4e50631772039ee2bb443f3e74b03c

    SHA256

    b1e94799a6524af432cbea7a298af403551b2453d432b2307589fb2ec8dfbb3e

    SHA512

    0c2437c6a5fe0f7d018c646245fd3d19a928a87c0a61fb982663594edfc628d2b9416651a77cd14be9279d1066987b388b3d65b664882b4c360122110e291370

  • memory/2344-116-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-117-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-32-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-111-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-118-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-119-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-120-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-121-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-122-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2344-123-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB