Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:02

General

  • Target

    68f06e65f35f269f29ae026ba6336e3c_JaffaCakes118.exe

  • Size

    732KB

  • MD5

    68f06e65f35f269f29ae026ba6336e3c

  • SHA1

    7aa0a85ba9ffdecda7fc782810b712627657bec1

  • SHA256

    a0e8d56559ae834123ccca88fbc04663a8f0adbf3da0b297f6dae798747318dd

  • SHA512

    0d0be9c1697ca5cedd18decf8c08ba1032908644f5057bcdee1d05af8deff74e8dd5e6961bc0a94b72990d4aaaa02e5a973f26774278d3b1eb95c841a90c4ca7

  • SSDEEP

    12288:j0gsaGle5IGICmMwHW0MB3ybbhGNWVCOlO/ohLftqacu3pS:wvaUG+9e3yGN6vcu3

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 5 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 11 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68f06e65f35f269f29ae026ba6336e3c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68f06e65f35f269f29ae026ba6336e3c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy1047.tmp\IS.dll

    Filesize

    94KB

    MD5

    194dcc4b0a5ad6b6f7c1f166d96c4476

    SHA1

    fb0390ac1e04a66f284adbd0af6e809bf5b0792e

    SHA256

    643e7fd4591d117c43515efc93d4ddbaf0879b14403531147f4c34a49275ffd6

    SHA512

    4161da2fddcd0561237082c639716aca566a7755dd0589c5b5d63d436dbb7df5838d2a7c8c11cbd74346d678cdb4c5b8022f78855f6a9613b17be9a47487af51

  • \Users\Admin\AppData\Local\Temp\nsy1047.tmp\NET.dll

    Filesize

    92KB

    MD5

    63834ec07c42859db4ebef4947046d50

    SHA1

    ea9551cba09926ae639c0ba93479049fc060af4c

    SHA256

    1bd3438268e3a8e6060ec607e503714805657d01b3a35fea289f2624ff3265c0

    SHA512

    972b8ecfa0ba2bae2f7ed269f66a11a90dfc45435f916bfee58ce493fb244b0b077412260390cf43adf64098f2771daabdd3541e2350137f450423d8c119503e

  • \Users\Admin\AppData\Local\Temp\nsy1047.tmp\System.dll

    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • \Users\Admin\AppData\Local\Temp\nsy1047.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    4ccc4a742d4423f2f0ed744fd9c81f63

    SHA1

    704f00a1acc327fd879cf75fc90d0b8f927c36bc

    SHA256

    416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6

    SHA512

    790c5eb1f8b297e45054c855b66dfc18e9f3f1b1870559014dbefa3b9d5b6d33a993a9e089202e70f51a55d859b74e8605c6f633386fd9189b6f78941bf1bfdb

  • \Users\Admin\AppData\Local\Temp\nsy1047.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    78b913fcd04259634a5e901c616e6074

    SHA1

    ad5e1c651851a1125bcad79b01ccdcfa45df4799

    SHA256

    e3ce60666bb88c2412615ef9f432ec24e219532dee5cc1c7aebc65ed9ec94d59

    SHA512

    cbe07179dd93011f3d9a8f83541961ff34fb83d96658ac82a433ef0aa3399b183eaec3e6a49ec1c1e478d1eada2d3ebc78ffb1ae0574984ae66a7a9cab5d59e5

  • \Users\Admin\AppData\Local\Temp\nsy1047.tmp\nsResize.dll

    Filesize

    4KB

    MD5

    a8655e0ca9e079edc631838273afc087

    SHA1

    20c4468e90f961c499870cfa6a179c82f6d72675

    SHA256

    eeb2705599c3075e652762e74c88d3cb482e01ad8cae65f02022f91aebf13cb5

    SHA512

    383201fc7f0d15f0d02ae638e411becac61eb5f475020220035ba6df560aee23cbb90082e6827aeaba434e150c08df87914e3cea308ed197f86d560eacc369e1

  • memory/2424-48-0x0000000073CC0000-0x0000000073CC9000-memory.dmp

    Filesize

    36KB

  • memory/2424-43-0x0000000073CD0000-0x0000000073CD9000-memory.dmp

    Filesize

    36KB

  • memory/2424-19-0x0000000074070000-0x000000007407A000-memory.dmp

    Filesize

    40KB

  • memory/2424-45-0x0000000073CD0000-0x0000000073CD9000-memory.dmp

    Filesize

    36KB

  • memory/2424-44-0x0000000073CC0000-0x0000000073CC9000-memory.dmp

    Filesize

    36KB

  • memory/2424-56-0x0000000073CC0000-0x0000000073CC9000-memory.dmp

    Filesize

    36KB

  • memory/2424-55-0x0000000073CD0000-0x0000000073CD9000-memory.dmp

    Filesize

    36KB

  • memory/2424-59-0x0000000073CD0000-0x0000000073CD9000-memory.dmp

    Filesize

    36KB

  • memory/2424-60-0x0000000073CC0000-0x0000000073CC9000-memory.dmp

    Filesize

    36KB

  • memory/2424-61-0x0000000073CD0000-0x0000000073CD9000-memory.dmp

    Filesize

    36KB

  • memory/2424-62-0x0000000073CC0000-0x0000000073CC9000-memory.dmp

    Filesize

    36KB

  • memory/2424-64-0x0000000073CC0000-0x0000000073CC9000-memory.dmp

    Filesize

    36KB

  • memory/2424-63-0x0000000073CD0000-0x0000000073CD9000-memory.dmp

    Filesize

    36KB