Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-04-2024 20:46

General

  • Target

    f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe

  • Size

    322KB

  • MD5

    f44b243799cc58c5a8a5098a50993b5b

  • SHA1

    024361d912ce8f6e24b0988d4bc6e522dba32770

  • SHA256

    57d4f650bfce31b9ae59803b8eda8d31155ba36cab49e52c33078691bf9682a3

  • SHA512

    ceae8a16fe35a6786d3b024b253b381c676099dba562c9ce90fdb8901ed50ac180e9d002a86812d08c0b8bcc7e5c715e4eff018bcc1f82bfbd14339cbf93a99d

  • SSDEEP

    6144:S9k1/S4w8e34Pl7UyZtnl72LiMNCUyZtnDtm76xkv:ck1/SPiljtnl4igwtnDg76W

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f44b243799cc58c5a8a5098a50993b5b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      PID:2268
    • C:\Users\Admin\AppData\Local\Temp\max9keygen.exe
      C:\Users\Admin\AppData\Local\Temp\max9keygen.exe
      2⤵
      • Executes dropped EXE
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\max9keygen.exe

    Filesize

    92KB

    MD5

    236e0270cee6f33ffdfaf2489341521c

    SHA1

    9a3f590e2546a4322ab43c1b84a045733f9a7b43

    SHA256

    e7f4a36acfda6821b334e9148a83864b782a66d75d5a99f8a95163c5da5efabc

    SHA512

    0cf3d4ca86785f284c962392fbd691bfe95c11e1fcffb0f9fc1298780d5e947af2979aa4b64388bfedd8768fdf82720226dea1e93e2a73e1ff652f08f0473726

  • C:\Users\Admin\AppData\Local\Temp\nsj5E2E.tmp\NSISArray.dll

    Filesize

    19KB

    MD5

    14b848866035dea39b912da628307231

    SHA1

    d00c8963aee8038d8a22f098cef69b31007196e5

    SHA256

    6a129a9eefae85a9412e889e0c74fdaa21d20254fa13cacef5429885775017dc

    SHA512

    4538058426c742bf7d823d1cac5303eeff8bf0b524459262181ac79695eead705e7590ae63ce996b8e3afd9a6c8d1fec503f9a11772ebe5c5c4e01930ed97b16

  • C:\Users\Admin\AppData\Local\Temp\nsj5E2E.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    168KB

    MD5

    a589909b706cb56ed100b34cd1eaba8f

    SHA1

    62f691d8ee9e68eb9ec4b1f5f81d2ac6d2329224

    SHA256

    53ad4387cc26ef8669004e1599b06a88218a47b8d627027466f73fb0aa891a88

    SHA512

    71df9e55e6eca7adea93abcc013ed1bd13e804cf54cb48f75da7ee162ad0331af7c86b658ed8a9f09b42ca55d14c29185ec8478424be31596c8a95fc8a268f31

  • C:\messenger.exe

    Filesize

    91KB

    MD5

    72a6d43a220aff3e2c3afc7ee86f5cad

    SHA1

    5869f365812f998a71b35a75cc6ac992d964c535

    SHA256

    2ab5a4918151220fe90dac7309173248d01cd3d2ab4dbe1712049588a0aa5cd8

    SHA512

    2057fceb499730dbdb5707505154180c41f0a8086ce1734f2da785a393a19875594065cdf823c0120314b924a1dd11b96195f068069e6b21f33ea74f59005767

  • memory/3568-46-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB