Analysis

  • max time kernel
    55s
  • max time network
    53s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 03:50

General

  • Target

    044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe

  • Size

    653KB

  • MD5

    044f31eba4d6145925a9a262eeb00648

  • SHA1

    aadb6d1f97f45915332f02474667d399baf0488f

  • SHA256

    22df97136b027bd1fa792c036dbda3675dec070db3a0e032dada9e51cfa7ac6a

  • SHA512

    38e616e290d31078b36d0baec3b9562c46db0204b38ca5b64e0315f2bc5e5ca32aed0118c439b8c7c1a1f07fdc80c0ddd67c5a57285357cffad7b1655b4f4e3e

  • SSDEEP

    12288:SKCFG+pl1Hp7p4ZkuRt4Zh3UdOxouSdWE7uglrB/jmN7Trkfcn+z4:S3Xxp4Zkuf47kdtdZ7uC/jmlrDn+z4

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 17 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"
        3⤵
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\0016e501ecf62f9d1e0ea5ff98d62e9163b91e1a.lua

    Filesize

    12KB

    MD5

    3d8665da9f10eb1cee52aa10aa63103e

    SHA1

    c93598630895b60cabfd22b4fc280158f70e75d9

    SHA256

    5894c927a6b2d7c5c0d43bcb24ba6235ed7a2a1e8d115e3fcea910723eb521d4

    SHA512

    e5a06fa3286319dada66cc0754bd8881698912c917c9b900f22b54f95e3f4b05577b473fac7bdc0ad1ed83457e200103ff2e3361cc6c9b21f969939e4942f7b1

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\026e996a3a5897970b058ffb093a163a1d763649.dll

    Filesize

    11KB

    MD5

    0a29e1b270ccea61aba7d7cdd10e0388

    SHA1

    76bf03361bcaef475ffb864bc1903c9bcaac7b44

    SHA256

    67328334d53e7c0c52c23ef5febeb1ab34d87ab7699868a9f547e5b0db4fdceb

    SHA512

    d024407b0852155c225852e6dd1a5440241a16c4b54a408606318ad142381ebf51bc8db09a4d175369619aaac2224311914892d23f763f7b533a6b664b93cf7c

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\05d97e6e9834ccf063c552e404b9ecafc5e4d662.lua

    Filesize

    18KB

    MD5

    81f3897e210d2c45e9da3670c7dbe4a7

    SHA1

    0f5fd37672efd549b2fbf89770ed5c95f388fc86

    SHA256

    5afcc891c767234cdd33d49840f35993cb23d6e4f6c31d0afa612deab9c185c9

    SHA512

    06d7be2569a0919f71d427f2f71862ff66a58c63103f714790c51152a359d3057d1208525de3a17d9e6ebca72991e3524689d28cf750ca86f692a1ea380cf83e

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\1370ebd534807c69ad0db6461cbf3f3fd03c434f.dll

    Filesize

    193KB

    MD5

    e390287499549de31da007f7f0ae4d10

    SHA1

    a8c6caebb151d60ea56f4c96a7194c0e5f076692

    SHA256

    b2e3b0e8d6c3fd23dc7d94fccc5151f07bf2e59271431268a58b5e99074b825b

    SHA512

    6c393bca7ea74747917e65f2e5e4822f034ef60defa5f3232b8f9a731ac8e00cffee3d44ab817f3986739b685506e0027647de50b3534e3436ca569d0c25b474

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\389da82bc55b853a5b301d1ded34c566dbac4d4f.lua

    Filesize

    45KB

    MD5

    07e03b7a67edf8aec9fa104ffb26b69f

    SHA1

    b2cc254605bc136e9f1bd29c6dd90eee767b2cfa

    SHA256

    293487a745a18ca2054037bb7a69ca7c4bbe19c1fee7ce62cf88672e9b2d064e

    SHA512

    3c2cdc34bb9c18329b475daba4a68f4fe5dbb829e45871286f0ccd3fd475d895830f31cf091e909986367da4c00e0a651c1405f9857998aa5800389d73aa2542

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\72ed3d41d77b75b2612d44bc1df80903b476928b.lua

    Filesize

    4KB

    MD5

    7dec81a81d64a228af2aa5dddce127b1

    SHA1

    304dc81198081ca2d015ef7dea88a987c7910950

    SHA256

    a6aa1794d8bbafe238f8ba92d62f18bd61ff7884e591582390f3343da3550047

    SHA512

    7ee2dc6bf040ccb1204d90fd025254e7e425eca2fb6a71b18a1c8cdfd489a88c70038e655a29d26e482575e0cc83d585499cc5e6ff215d548befadf117cd156f

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\7a0c7559331d92414337ab9237a8a62c13d544ee.lua

    Filesize

    15KB

    MD5

    7bf73b6249ed6cc73bc9af1fe5d3bf6b

    SHA1

    7f25228043b91a11eb02e443f2b3f20e88edf008

    SHA256

    f4c4bd5657b442b51e962d6c05ad79befc911d217f4131f8a6074f018d32dd98

    SHA512

    c2989717fd2d2676ed2ebcb2a56a68def862f5cbe721c0ce0f0a68a0bc9147a6a6f4a8b41f085a17709cdaf04cf79d5621eff198a1ccb0007ac6aa852526c93d

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\7b2584cd1b859d0b92b2ad88463adbe6757e8ae1.lua

    Filesize

    8KB

    MD5

    f273a694acedd917336a47ab09efe2eb

    SHA1

    8ff862146d5f939ad4de785a9bce2378ef5b8d98

    SHA256

    065a0d4ccd9d5019cb97232a67f5c5ae3e6cb943b48f263f1d1eaf21e15c0e5a

    SHA512

    aeee518d9ef1659372b9b46a09f7bf22ae439e8cb5abf6c588c8fc7971d534388e4ec3ca3fa1e02fb374ee3c5b399e94430eaab87423cbec385ca2db4aa99d4d

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\7c5fb38f536c5e201a10ce382c0756a186346bc2.lua

    Filesize

    392B

    MD5

    77c50916f90b43c09e38e07b94ce4356

    SHA1

    2407be8f458d1aa2f1ffa45b21f782c44e68331f

    SHA256

    902fc7d3982d9386d60c4c304574381563ee28e73de993e28cde7f90499ca1cb

    SHA512

    039a24175948dfbd8c23b070d3aeb7bd93186a6093cbbe760981f1ef87bf7f97ed1f6bf5c6a7d2b9b12834e6776da03c40a03f7f43a9d7803a7f459a8a023ccb

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\7d4b85d62fb353e7a43256f40d539ceb6fd06006.lua

    Filesize

    8KB

    MD5

    e440044afe6c761507a996b5b45ab0f9

    SHA1

    ef772c758fd5d6098b41375f35ac26f3963cc306

    SHA256

    b1864aed85c114354b04fbe9b3f41c5ebc4df6d129e08ef65a0c413d0daabd29

    SHA512

    8a82df90459929de1c91ed29a122a149749d42adbb85faf0c3123d0f0886babc90cb93de85105feb7497b46552a6747ae05b985f5a488d1d8f1a2a7db44077b4

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\87a5250e7389d052be3fdc257872ebd873ef2deb.dll

    Filesize

    80KB

    MD5

    4bf7db111acfa7c28ad36606107b3322

    SHA1

    6f20b9f6663ce0c309a2ce60e718d64ffb6c75b3

    SHA256

    bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0

    SHA512

    0a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\FloatingProgress.dll

    Filesize

    25KB

    MD5

    0f26c6d34d3841e93145dd00d0175651

    SHA1

    57b068569d0eb2336503beed87589629ab2a6f1f

    SHA256

    0cc5dc45b6a04ec236f4ecf0eeee212096b1561179d71c49dd5fc82aba706741

    SHA512

    72785e520d78a4ebd8779e5497806406c1b91b9c05ed82a392a6af689781e26c77f0032c66540b80e2e7e457128df2afd0647b0dbc970a11d0cd4ee3930d47a5

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\LuaXml_lib.dll

    Filesize

    11KB

    MD5

    7292b642bd958aeb7fd7cfd19e45b068

    SHA1

    19a800620d041634abae5b5d096cb0e87ce4c188

    SHA256

    90f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09

    SHA512

    bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\System.dll

    Filesize

    10KB

    MD5

    7e3c808299aa2c405dffa864471ddb7f

    SHA1

    b5de7804dd35ed7afd0c3b59d866f1a0749495e0

    SHA256

    91c47a9a54a3a8c359e89a8b4e133e6b7296586748ed3e8f4fe566abd6c81ddd

    SHA512

    599f61d5270227a68e5c4b8db41b5aa7bc17a4bbe91dd7336b410516fa6107f4f5bf0bbb3f6cc4b2e15b16bf9495fdc70832bab6262046cb136ad18f0c9b3738

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\UACInfo.dll

    Filesize

    4KB

    MD5

    d02a497be5f89c44827f142c4662f591

    SHA1

    38f83ccbac11de069df0e1cd79a6fdf7f006516c

    SHA256

    6d29dfd24695535b5973d8261d93373603ceaae03ab97662fe1b3dcc47d18226

    SHA512

    81c87f9d56a8ab7703a4effd3ba7b982b6765ecbdc0dbb1c595f549c4310a5db57dcdc38929eafe56983ea8cefc0b572c3faf82a4b62eb7c564b05550215f1c1

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\a2a55e68a147ddb026454c38213bc01a3979f52c.lua

    Filesize

    13KB

    MD5

    d4913b3dfc6136467ca1367e5464f32f

    SHA1

    f186c17758c4b95770f2bc4004e3f672a47d12bf

    SHA256

    0ed1939e72fa1e6e24e5c3b8dd1ee8604b4572711d1274fa16dd0d3a46d6b848

    SHA512

    c0e40fda1bf6833a039dbb4046439b25321789d0395a07832f10b3ebe5051d6905a506f1922f0f3ce54a78795e495fe2c08899f2254264035e7fe236cce3f4f3

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\c5bfcd4d85ffe4e22099630f8abb9b98b714e7e0.lua

    Filesize

    8KB

    MD5

    6a544a1476ac90d7083dfe39ad6ca7df

    SHA1

    e6228d3efb9bfafc743ec174cc8c6d3b5b58a685

    SHA256

    1994f9e3e7ef24737ead6cef4bfe1984afe97ee5aab758ca73058ed7f4419dc7

    SHA512

    24b300d1e66f1ddc38635e517f6a83121fef2049e30269eb83d8fcd7e838c3e25d12567d717e400148ce67940e16fdeefce081d95bd80e8e605d557eae65e30c

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\c6d51ab09f96b7569326130e860517b7d87e866d.lua

    Filesize

    2KB

    MD5

    4bfdaaab9014fe129bc6388fd5687c8f

    SHA1

    2c6ff28245e1dc7ec9ac1c43c3cda354d07b2c4a

    SHA256

    e9167e0da842a0b856cbe6a2cf576f2d11bcedb5985e8e4c8c71a73486f6fa5a

    SHA512

    3a1a4d838bb5cafe71da262ee7bd6dccbd30dd4d7abe0d04f6ecf96bf704d5e111967be812894a47f2eb3374ee110620b7cc47eebac8b72ddcf7f506ba82a607

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\c9f011a4972686d5e6b3011c1f3d869999161f98.lua

    Filesize

    4KB

    MD5

    f74fde2b2767ee1c6bd629f1f4e86843

    SHA1

    69545a460f4ab38a2e952c8027616edced07ad20

    SHA256

    d0072d2890f1cdffaa802be7989cab29a24e38508d53ab47ef9e1c40b0c2c52f

    SHA512

    b62cc38fd1694508e46ed56d57043d6028a1b472b52737a89cbdf55be641b95e03f16160c24df247cb7a2d0be11e108b4db5a43ae0068ae3b87baecb4aa82413

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\cf7afea710adf5a4494f7eea03db9c908baf9a8f.lua

    Filesize

    56KB

    MD5

    9071d5a0acae2381208e2b08f683ab7d

    SHA1

    6b5cb2e7ee1b5db330b1293f87f5d01c04b32f48

    SHA256

    b07042324547c647b9288d2ab3ffc27037c2751ddd3739fe5b1f097d95d5d767

    SHA512

    99af41f8fdcb692796cae9a5fde1ce5d312e2e34affbd8915f02f4690774bea339eb32a00e27d8ae9d1bd980a080c5eddd553b51f1363581bad9ab6ca0a6eae3

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\f40368059830399ce8189100003d317f2739d087.dll

    Filesize

    52KB

    MD5

    4a4845ba1666907f708c9c10a31ec227

    SHA1

    1ebf626adc84147e5114885ce779f92d6eb68f3a

    SHA256

    a1ffee9687ab4a23a78b3251888aff09e2896d76f8d16d713367b265f125188d

    SHA512

    d009f5e2a2ecfbec5e5e788ade142d612846d0c99921774e4a11b060998dfb0680cf1e1a54604535d5560738093f9ae166866cb23eee5c7d9c4e5cc5a33e7464

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\f49f0cb90d014cf5c8ac1925a9478d720c972747.lua

    Filesize

    2KB

    MD5

    8004e3f267460e8a83ed24b72291f6b1

    SHA1

    01766537875cddf1d48a1d87e2048641c1b4b368

    SHA256

    d2c6858503e065ac5f751365349f236706edbfbdca4b86ed7ea9ef8626996c48

    SHA512

    995b2bcfeeeb7b3a329169973b2d9ba9f69e1042f2b74bb65e9b523c158279425f1dd0688eeb5291850580fd3bc053ac099bd055b8b31ea92625763446525cda

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\lua51.dll

    Filesize

    255KB

    MD5

    fceee0026aafd237afdb4aea4ecd3557

    SHA1

    3e10da57143599eae915a688178abada78b8d82b

    SHA256

    85db1e17c0fad08d9732405e781cda1e1613ace31c540a6e559cd8777df2c62c

    SHA512

    9c974918c8afec8d8a58fc1239f269544b9dfe867459bb61901462f56f71a3dd574d3b2263dd14b99ff8a23c8096c408be3620785fd4476b975a43b999f559f2

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\step1.lua

    Filesize

    53KB

    MD5

    244facd25b2b0dd97d6e1ddba949bf63

    SHA1

    89b6fa12afd1dc5aafd2bd1f42bb3ca961ed6cbe

    SHA256

    4b364b85f26909c422dd344fa4863ea9649f05cf349ed6c1d8116811e3cdf6e5

    SHA512

    a1f4fa96913079e0ddbd3c603073b6edd6e5d835470e5655ce8f04088e958461836da4a8ebe3169366c0bcd35bb6c73267904ecf0a0b3a822a55c914e259177d

  • C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\versioninfo.dll

    Filesize

    6KB

    MD5

    ebc5bb904cdac1c67ada3fa733229966

    SHA1

    3c6abfa0ddef7f3289f38326077a5041389b15d2

    SHA256

    3eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75

    SHA512

    fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f

  • C:\Users\Admin\AppData\Local\Temp\nsy36A2.tmp\LuaBridge.dll

    Filesize

    62KB

    MD5

    4e08fe995ab74ba4d145ddb77ea095fc

    SHA1

    e4bb337e40069c097e7abd566b7427b11fb124ee

    SHA256

    ace3c561f186dfbb5c992f85ea2ab4d3061894509af6960e9d819152afa46b17

    SHA512

    b056fbe0e79d90f8ce0908eb2b75f589e4415ed462868aaff6032f12dde394058cd221d317b92fc4809aa27d6cf2e801c4215db3cab1267ebd9dbc9af7b7041f

  • memory/4236-106-0x0000000003240000-0x0000000003256000-memory.dmp

    Filesize

    88KB

  • memory/4236-29-0x0000000074500000-0x000000007455E000-memory.dmp

    Filesize

    376KB

  • memory/4236-140-0x00000000032A0000-0x00000000032AE000-memory.dmp

    Filesize

    56KB

  • memory/4236-253-0x00000000021B0000-0x00000000021B9000-memory.dmp

    Filesize

    36KB

  • memory/4236-416-0x00000000032E0000-0x00000000032EC000-memory.dmp

    Filesize

    48KB

  • memory/4236-415-0x0000000074500000-0x000000007455E000-memory.dmp

    Filesize

    376KB

  • memory/4236-413-0x00000000021B0000-0x00000000021B9000-memory.dmp

    Filesize

    36KB

  • memory/4236-208-0x00000000032E0000-0x00000000032EC000-memory.dmp

    Filesize

    48KB