Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 03:26

General

  • Target

    383a29792ab3b1da5b60efc211f0c1d8_JaffaCakes118.exe

  • Size

    443KB

  • MD5

    383a29792ab3b1da5b60efc211f0c1d8

  • SHA1

    40b44944f8f2c71e0a5a1c9659de5b4d1139c6c3

  • SHA256

    1a2a980be1c84714ffa89fbda50c7e05da8eeab0c270c3ca264aa13d70145185

  • SHA512

    11a7baef8b94338468dc990ff9e506bee8d76643ecb956965da36c88beeb9c7eeeb0b287b7c1d5a0ad33e2fa2269c4e458d88738e7732fdc0f644ba191ab3047

  • SSDEEP

    12288:hvaFHfGC8X1+WUSK1AkWu9AP6jWwmw6LVW:hvyeXX1c1FW+APldfLV

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\383a29792ab3b1da5b60efc211f0c1d8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\383a29792ab3b1da5b60efc211f0c1d8_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 396
      2⤵
      • Program crash
      PID:4016
    • C:\windows\SysWOW64\notepad.exe
      C:\windows\system32\notepad.exe
      2⤵
        PID:1336
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 80
          3⤵
          • Program crash
          PID:3036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1268 -ip 1268
      1⤵
        PID:2348
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1336 -ip 1336
        1⤵
          PID:2472

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1268-0-0x0000000000400000-0x0000000000508000-memory.dmp

          Filesize

          1.0MB

        • memory/1268-2-0x0000000000790000-0x00000000007D7000-memory.dmp

          Filesize

          284KB

        • memory/1268-3-0x0000000000400000-0x0000000000508000-memory.dmp

          Filesize

          1.0MB

        • memory/1268-5-0x0000000002350000-0x00000000023C9000-memory.dmp

          Filesize

          484KB

        • memory/1268-4-0x0000000000600000-0x000000000060D000-memory.dmp

          Filesize

          52KB

        • memory/1268-6-0x0000000002430000-0x0000000002431000-memory.dmp

          Filesize

          4KB

        • memory/1268-8-0x0000000000400000-0x0000000000508000-memory.dmp

          Filesize

          1.0MB

        • memory/1268-9-0x0000000000790000-0x00000000007D7000-memory.dmp

          Filesize

          284KB