Analysis

  • max time kernel
    124s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 10:42

General

  • Target

    342b6eafbc9f18889a492925a33a2cc5_JaffaCakes118.exe

  • Size

    18.1MB

  • MD5

    342b6eafbc9f18889a492925a33a2cc5

  • SHA1

    041fcba34d990603fd63074394c40243312a4dfe

  • SHA256

    90263f5e0ceee73af6ee6ca4dac8e6441c1f5c39607512a954e42887a5a0bb3a

  • SHA512

    d58819cad03fb0625129dd3a7fc3846ead1e028944b6516af8f3ca0261c2619ebda78be0a6f3d4cf87b03556fd10d5d49f695ce829997128d0eee115ebec4da7

  • SSDEEP

    393216:Xm4I12ZQV+9llWqi0a2jVbHp5hAK0w5sXQr+xP9fPACdObQvnQ9ScGnCRByGz/O3:Xm4IcZMQWqzVbpb0IsXQ89npOE1crzm3

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 31 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\342b6eafbc9f18889a492925a33a2cc5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\342b6eafbc9f18889a492925a33a2cc5_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Loads dropped DLL
    PID:4020
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3976,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4044 /prefetch:8
    1⤵
      PID:1460

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsyF474.tmp\System.dll
      Filesize

      11KB

      MD5

      7399323923e3946fe9140132ac388132

      SHA1

      728257d06c452449b1241769b459f091aabcffc5

      SHA256

      5a1c20a3e2e2eb182976977669f2c5d9f3104477e98f74d69d2434e79b92fdc3

      SHA512

      d6f28ba761351f374ae007c780be27758aea7b9f998e2a88a542eede459d18700adffe71abcb52b8a8c00695efb7ccc280175b5eeb57ca9a645542edfabb64f1

    • C:\Users\Admin\AppData\Local\Temp\nsyF474.tmp\UserInfo.dll
      Filesize

      4KB

      MD5

      9301577ff4d229347fe33259b43ef3b2

      SHA1

      5e39eb4f99920005a4b2303c8089d77f589c133d

      SHA256

      090c4bc8dc534e97b3877bd5115eb58b3e181495f29f231479f540bab5c01edc

      SHA512

      77dc7a1dedaeb1fb2ccefaba0a526b8d40ea64b9b37af53c056b9428159b67d552e5e3861cbffc2149ec646fdfe9ce94f4fdca51703f79c93e5f45c085e52c79

    • C:\Users\Admin\AppData\Local\Temp\nsyF474.tmp\version.dll
      Filesize

      22KB

      MD5

      fbe588b15eb1bd86defade69f796b56f

      SHA1

      2f63cf44039addddb22c2c0497673b49e6b3ad7a

      SHA256

      31144e8b156fe87317073c48a09abcb033fda8dbdd96986c4abea8c00c00355f

      SHA512

      e1a9e29e4c62e77a2ec2c539344f0b5a8cd67ca3fd8dfefb0b0666a992eb2fabadb0034d439c4adbbdffd9c9439f23ee5757fac0ed669d3c9db48f50c677143d

    • memory/4020-59-0x0000000006820000-0x0000000006832000-memory.dmp
      Filesize

      72KB

    • memory/4020-19-0x0000000008870000-0x0000000008882000-memory.dmp
      Filesize

      72KB

    • memory/4020-56-0x0000000006820000-0x0000000006832000-memory.dmp
      Filesize

      72KB

    • memory/4020-20-0x0000000008870000-0x0000000008882000-memory.dmp
      Filesize

      72KB

    • memory/4020-58-0x0000000006820000-0x0000000006832000-memory.dmp
      Filesize

      72KB

    • memory/4020-57-0x0000000006820000-0x0000000006832000-memory.dmp
      Filesize

      72KB

    • memory/4020-78-0x0000000008870000-0x0000000008882000-memory.dmp
      Filesize

      72KB

    • memory/4020-77-0x0000000008870000-0x0000000008882000-memory.dmp
      Filesize

      72KB

    • memory/4020-79-0x0000000006820000-0x0000000006832000-memory.dmp
      Filesize

      72KB

    • memory/4020-82-0x0000000006820000-0x0000000006832000-memory.dmp
      Filesize

      72KB

    • memory/4020-81-0x0000000006820000-0x0000000006832000-memory.dmp
      Filesize

      72KB

    • memory/4020-80-0x0000000006820000-0x0000000006832000-memory.dmp
      Filesize

      72KB