Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2024, 17:36

General

  • Target

    e808715c4fee816936736b4d7564bc80_JaffaCakes118.exe

  • Size

    247KB

  • MD5

    e808715c4fee816936736b4d7564bc80

  • SHA1

    6f0157274b01754f32123dacc88196aae678100f

  • SHA256

    16b1be1cdf32bd5dd7cde26777c95c87f95f4d2d7c9a4f4e31b96b06e714673e

  • SHA512

    9c5ee6ce797bb228dfef73112440c47a7cc59b1a0224adca9ac89246a480cdbd3d0ecacd479eb94b7a9b81a65be80aa14d6ade6b33bc27e107802178c5a763c0

  • SSDEEP

    6144:7AQnIaoYyFijuBWX4TvHlYdgD4ueAq/7fC8:lyFijUiwFYdgD4uev/7K8

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 5 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\e808715c4fee816936736b4d7564bc80_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e808715c4fee816936736b4d7564bc80_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    PID:2356
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2260,i,3303482231723870786,2954015409682154873,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:756

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsp6C87.tmp\inetc.dll

            Filesize

            25KB

            MD5

            29e2dcdfb57ee3ab5e2bbc2fc3c42f02

            SHA1

            bd6cafcce5b70ee15311f9f53e9fd4aac819ccda

            SHA256

            2b7a69e98ed4975fd4eade513cff17099c43b3eebe7e7641696d1d20e8e14b2f

            SHA512

            f71c981b3b5308566b56156462d106ebf8e49a32e55b70891f9d70338941afd347cb4df374fe38b9b3d7309f63dd75a7c80ebe02bb8941d558cd638a6f8daf7a

          • C:\Users\Admin\AppData\Local\Temp\nsp6C87.tmp\nsDialogs.dll

            Filesize

            11KB

            MD5

            66cfc94903c8cfa492fdab42bde2026d

            SHA1

            d07194419d914eae5dc54a480ebddb0a8cb32f25

            SHA256

            82e21860521feea4d15ff7f30538b9d0ed1860747c98549ec85217178a6db632

            SHA512

            ecbc2c9361bef9332fe8e1675d11884c344b26f437eee9db3ec0b5999bf20e16b1d863c192e2091375a870cf8f4674deec16875ba56757b88cc859288305eeb7

          • C:\Users\Admin\AppData\Local\Temp\nsp6C87.tmp\nsJSON.dll

            Filesize

            7KB

            MD5

            b9cd1b0fd3af89892348e5cc3108dce7

            SHA1

            f7bc59bf631303facfc970c0da67a73568e1dca6

            SHA256

            49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

            SHA512

            fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

          • C:\Users\Admin\AppData\Local\Temp\nsp6C87.tmp\nsRichEdit.dll

            Filesize

            5KB

            MD5

            02f1858b3131ffc3fc5e3a5391d3a489

            SHA1

            454a6d749cf55ff990bd9f57941aca9d1f1674f6

            SHA256

            f00bd6d3e7c7b8e8ad18b7dc6275fb80cc720fb164200a6506f50f6e66998b12

            SHA512

            8147fa8014a5065f4fed7de1fbb9c2ee2c1b94d63596f7bbcf6821ecd41a73d25ebdfa1e71ca74d7598cba063042b6dfcaf050a23d0c855a7b6fbc94147ab41b

          • memory/2356-5-0x0000000074500000-0x000000007450A000-memory.dmp

            Filesize

            40KB

          • memory/2356-17-0x0000000073930000-0x0000000073939000-memory.dmp

            Filesize

            36KB

          • memory/2356-30-0x0000000000400000-0x0000000000458000-memory.dmp

            Filesize

            352KB

          • memory/2356-32-0x000000006EB40000-0x000000006EB4A000-memory.dmp

            Filesize

            40KB

          • memory/2356-36-0x0000000073930000-0x0000000073939000-memory.dmp

            Filesize

            36KB