Analysis

  • max time kernel
    138s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 06:24

General

  • Target

    093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    093ae388aa995d138dc06120fbf8af37

  • SHA1

    06842bee75476ba9deb4ed47dd880ae3224ce9b5

  • SHA256

    a944aede510112b275795e1ed178f7f9ad3d1835239c8518ec38f4b7eb59d22f

  • SHA512

    31f24e51c43d0adb63cd0f71a07393273bc711769dc02838a81132a26471a3f4d59a4aaa32dca1ea03b84008c800e0ce1be77bc689acdc86b733d3e6139c2e1b

  • SSDEEP

    49152:kXdUu02MpdL1U3vDLk1tyeN8ENB+Kp7Gbk4SL3Ca58c:c2uyTL10bm5NLNB+OGoma5D

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\093ae388aa995d138dc06120fbf8af37_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsdF2F.tmp\BDMNetGetInfo.dll

    Filesize

    314KB

    MD5

    12f98be1d919784370eb0f87e78b60d8

    SHA1

    d07de2227b2ec68545be0adeb042af457d68f9e2

    SHA256

    63e34375374ae6cc695c0bc03f1f9aad67e068fc51962fd25edbf2fbeceda9f9

    SHA512

    ab2fcdd3eb7b58f044a855b5cae744bc1b3be599cf0d22ee93ccce2e97cb3bc1f36ea2c1ed75013c76f8c9e4071ba29710595c3a57cda2470885ee9293fc2d8d

  • \Users\Admin\AppData\Local\Temp\nsdF2F.tmp\BDMSkin.dll

    Filesize

    1.3MB

    MD5

    39257175ac9c90199c69aea1a7bcbda0

    SHA1

    6cf4a8dedf37d24ce902f34fa66120a214e1a2cc

    SHA256

    84d5fb0a7cf1bc1e4bbd0de51d3b7eb04bb92af9a1fc3675601b382a5f11d9fc

    SHA512

    4a71d0ac3df53b25509205e9ed0bf781cbefa2ba6307501ae336488c8a3f7f627b8d01f861adbf47986e168abab5a06b36848f87cbcf27fe846e5f0ffc3a9f53

  • \Users\Admin\AppData\Local\Temp\nsdF2F.tmp\System.dll

    Filesize

    18KB

    MD5

    1c951bbcbc780046d6be1079a04870a4

    SHA1

    a5bae7d838973154e6fac69b1c5ff7d2cda01906

    SHA256

    d23676fbcf76355d1af68e7b32964b837243349920921b2ec74d97554809a65e

    SHA512

    62c3686baed2232f7d8ddc8f48a41761812b5b2a67f3a689b7a43275f077842366abc13c7e8259613bfd9df25cf467e4001337c1454aec910abce121d551e2d8

  • \Users\Admin\AppData\Local\Temp\nsdF2F.tmp\tmp1flsct.dll

    Filesize

    2.6MB

    MD5

    e6f399b01f56188ecb0ac79d39989bf9

    SHA1

    d4e4a1ff7ec6558f03a2ba19c06f6c5e7471691b

    SHA256

    aebf600d0056c2a0aab6e7b12ab6cbdb6a990edca79f602cd8bd042c0b73ab1c

    SHA512

    e28b582e0f697b873a6d4363af050364db94a7fbcd28d8cb09c2f14feaa9cd727c4947cfd5c4daa0065c3543d530156f30133db4dfab63b55c741f155337e59b

  • memory/3020-19-0x0000000002AA0000-0x0000000002BF7000-memory.dmp

    Filesize

    1.3MB

  • memory/3020-25-0x0000000004730000-0x000000000477F000-memory.dmp

    Filesize

    316KB

  • memory/3020-30-0x00000000047A0000-0x00000000047EF000-memory.dmp

    Filesize

    316KB