Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 13:22

General

  • Target

    2a27d644a514962bc5abc6194dfc5298_JaffaCakes118.exe

  • Size

    284KB

  • MD5

    2a27d644a514962bc5abc6194dfc5298

  • SHA1

    81b5c5dcc812d5be926ccff41ab3c4f89fc1adea

  • SHA256

    108636fe141b7d2ebb2ebcb89c2beffc43be827a8bb4e2f9313cbb26a5d3b327

  • SHA512

    569326108133c4185950ce16bf6cdca70e276bfeaae48f25a9e848a2adc8f52df525d9839392251e357fce6609e7f81a4aeabcc4d20ab38cfc2213ea0d3d5a05

  • SSDEEP

    6144:TAQnIaoY3ZkA+MVc6qP9sVfrNQ2TU6Lyu6urpjwmk+Zt:dGShqmVjq6GWdjLkOt

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 10 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a27d644a514962bc5abc6194dfc5298_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a27d644a514962bc5abc6194dfc5298_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\stats.txt

    Filesize

    35B

    MD5

    28d6814f309ea289f847c69cf91194c6

    SHA1

    0f4e929dd5bb2564f7ab9c76338e04e292a42ace

    SHA256

    8337212354871836e6763a41e615916c89bac5b3f1f0adf60ba43c7c806e1015

    SHA512

    1d68b92e8d822fe82dc7563edd7b37f3418a02a89f1a9f0454cca664c2fc2565235e0d85540ff9be0b20175be3f5b7b4eae1175067465d5cca13486aab4c582c

  • \Users\Admin\AppData\Local\Temp\nsy1AF2.tmp\UAC.dll

    Filesize

    13KB

    MD5

    431e5b960aa15af5d153bae6ba6b7e87

    SHA1

    e090c90be02e0bafe5f3d884c0525d8f87b3db40

    SHA256

    a6d956f28c32e8aa2ab2df13ef52637e23113fab41225031e7a3d47390a6cf13

    SHA512

    f1526c7e4d0fce8ab378e43e89aafb1d7e9d57ef5324501e804091e99331dd2544912181d6d4a07d30416fe17c892867c593aee623834935e11c7bb385c6a0a8

  • \Users\Admin\AppData\Local\Temp\nsy1AF2.tmp\inetc.dll

    Filesize

    25KB

    MD5

    29e2dcdfb57ee3ab5e2bbc2fc3c42f02

    SHA1

    bd6cafcce5b70ee15311f9f53e9fd4aac819ccda

    SHA256

    2b7a69e98ed4975fd4eade513cff17099c43b3eebe7e7641696d1d20e8e14b2f

    SHA512

    f71c981b3b5308566b56156462d106ebf8e49a32e55b70891f9d70338941afd347cb4df374fe38b9b3d7309f63dd75a7c80ebe02bb8941d558cd638a6f8daf7a

  • \Users\Admin\AppData\Local\Temp\nsy1AF2.tmp\nsDialogs.dll

    Filesize

    11KB

    MD5

    66cfc94903c8cfa492fdab42bde2026d

    SHA1

    d07194419d914eae5dc54a480ebddb0a8cb32f25

    SHA256

    82e21860521feea4d15ff7f30538b9d0ed1860747c98549ec85217178a6db632

    SHA512

    ecbc2c9361bef9332fe8e1675d11884c344b26f437eee9db3ec0b5999bf20e16b1d863c192e2091375a870cf8f4674deec16875ba56757b88cc859288305eeb7

  • \Users\Admin\AppData\Local\Temp\nsy1AF2.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    b9cd1b0fd3af89892348e5cc3108dce7

    SHA1

    f7bc59bf631303facfc970c0da67a73568e1dca6

    SHA256

    49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384

    SHA512

    fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

  • \Users\Admin\AppData\Local\Temp\nsy1AF2.tmp\nsRichEdit.dll

    Filesize

    5KB

    MD5

    02f1858b3131ffc3fc5e3a5391d3a489

    SHA1

    454a6d749cf55ff990bd9f57941aca9d1f1674f6

    SHA256

    f00bd6d3e7c7b8e8ad18b7dc6275fb80cc720fb164200a6506f50f6e66998b12

    SHA512

    8147fa8014a5065f4fed7de1fbb9c2ee2c1b94d63596f7bbcf6821ecd41a73d25ebdfa1e71ca74d7598cba063042b6dfcaf050a23d0c855a7b6fbc94147ab41b

  • memory/2324-8-0x00000000751B0000-0x00000000751BA000-memory.dmp

    Filesize

    40KB

  • memory/2324-53-0x0000000074A40000-0x0000000074A49000-memory.dmp

    Filesize

    36KB

  • memory/2324-55-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2324-57-0x000000006EB40000-0x000000006EB4A000-memory.dmp

    Filesize

    40KB