Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 10:48

General

  • Target

    4ab30159706da3e39bed75e5ac01c06c_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    4ab30159706da3e39bed75e5ac01c06c

  • SHA1

    634f89e24984a69a6d9e93c49385644fb36eb5cb

  • SHA256

    1791d745c5825b29a98920d891de282e30aacc1eadafbe1dd0cb40a54ede7520

  • SHA512

    cf4a9666e983f7947deb639450f77344dbc36e528dd3e0f188f849ac839d5dc8456b4ce93346bd2a47ea5952a77dc72122a0a1d2a6594b2a49616424457d4089

  • SSDEEP

    24576:iWILMsW6KiCisq6KX2Y6T8Xo7oFjLn6hUb1wHqIWpdpspQma8tHb3f/1T:iIs7si5RPXJ9dpOqVm51N

Score
4/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ab30159706da3e39bed75e5ac01c06c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ab30159706da3e39bed75e5ac01c06c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso1C3A.tmp\ioSpecial.ini

    Filesize

    557B

    MD5

    ea0c7f571d41f05093224446cb11c9f8

    SHA1

    92d7b35da4261b3f5c0cd6d802335a42994e8811

    SHA256

    7542f198fabf34aa65f9202db232c028155aa5b4afd645bde132556ae8f7ff84

    SHA512

    636209f9923e0f85524d64fa8c6e22061d8809dce844ba76590633287d19839621932970442d2ba808302912c053bae698dadba51476bcd3a17bf5317c8ba7a4

  • \Users\Admin\AppData\Local\Temp\nso1C3A.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nso1C3A.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f