Analysis

  • max time kernel
    57s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 20:53

General

  • Target

    01a4b2c4aaf3eb052b853068a2b5fd47_JaffaCakes118.exe

  • Size

    20.0MB

  • MD5

    01a4b2c4aaf3eb052b853068a2b5fd47

  • SHA1

    39e842d7f00a6ffd21fd0c6baab4782f050b7625

  • SHA256

    c58cf81c52c2b4d0381002c1749d3c41d9c77f00e4a275753cf41ca17b1fb83e

  • SHA512

    7e2696f5c67607e06f62457edf0a94a206b048e6f7eb643490c0d0ce9529cbc17a6632be1ab8e48986f6659f9223f24408af6678e90621ce5bbb8c01c09b793a

  • SSDEEP

    393216:LwqmjXGUyywOE+B9n573BBvcpdJWtLXoHoaq6On6LgCEJ4k7gPq5TtJUI:LXmjg7+B9n5LvcLJ+cIa1OEMH7gwJ3

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\01a4b2c4aaf3eb052b853068a2b5fd47_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\01a4b2c4aaf3eb052b853068a2b5fd47_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy42B7.tmp\BrandingURL.dll

    Filesize

    3KB

    MD5

    9c3488b5e9655d1837c3963ecec33f70

    SHA1

    f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3

    SHA256

    05ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a

    SHA512

    6af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7

  • C:\Users\Admin\AppData\Local\Temp\nsy42B7.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    b18dfaded8f6d2380fdfd8f6b6969211

    SHA1

    969fa0e906240ab1123254feeb833c275626cf76

    SHA256

    747d0222b652dbfc85e0de4f8486473662d325a55e32c7eacb91e53e37ceba58

    SHA512

    25fb09b8657997d31e61c908f1cd08357c1a1b68bbb1ba377e87b6a3eb347a2ef96c1a771b6c4332853abb33728c55c83efa73df5da03f3dfc132f8a69a2886c

  • C:\Users\Admin\AppData\Local\Temp\nsy42B7.tmp\System.dll

    Filesize

    10KB

    MD5

    810f3a0aefe36a9f63e29e604bea91a9

    SHA1

    2559d3d4adf51f8ecbe2d07e669e344eb7d0bd80

    SHA256

    f160eb7a1b4eb8d2e99e7424ae058acd81ba5019e43cbfa0ce81e3102b356779

    SHA512

    836b73c38ab60260e1bc81ebf8347e14d02453fc361b7d6f10f137287b8189f8bc43758ce2d9def8fd1c71112aab7ef1930af2d64ae69f6d4e58a6fe17b310bb

  • C:\Users\Admin\AppData\Local\Temp\nsy42B7.tmp\ioSpecial.ini

    Filesize

    608B

    MD5

    a84f9e528af4aec55c69d0cd8a0c2743

    SHA1

    6def8e9bada3d7c3e5d882881af489995d40a3b5

    SHA256

    4a793b650950ea66881196d22e4690fef7eb410cf70d4c0bfc7aa53be87f7271

    SHA512

    56b2ddce6280ca1915fbfe6964b3625ffaff2cc80fbf784269bc82934e03811fbd44fe00a62395957cbe138e99923e2f4515fbffbbb59b89e09dc9e183834b9e