Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:41

General

  • Target

    658f78184be7051163d1b46cec615012_JaffaCakes118.exe

  • Size

    16.9MB

  • MD5

    658f78184be7051163d1b46cec615012

  • SHA1

    ed7a15e0e7e6d6f1317ae30cb93a670a0072cf4f

  • SHA256

    df5b4f8f0a459bb640a2a42028d9c9afd048d136ae98583d4040b01b07260167

  • SHA512

    62545703ac72397dd98c4ced912f2379c398b9a48e2d78751df92e540e5b8ee4755c21c60ce767177b4078fdf199d0483c2ac4be90584546f7433304feb1b62e

  • SSDEEP

    393216:GJ/oIL+cnAWGVuL4VmxXT5/WvTymGW2yoepd4Whbr:G+I6cAxoL4VmXuGmG4dWA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\658f78184be7051163d1b46cec615012_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\658f78184be7051163d1b46cec615012_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Checks for any installed AV software in registry
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\stext.exe
      "C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\stext.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\banner.bmp

    Filesize

    174KB

    MD5

    94715ab02d666f0b19590030e1bd4f8a

    SHA1

    887f618c0ac49ce0209a0e54f6ae97ac501764df

    SHA256

    d1b6bbc5aafc9d3d578d7644d28223a64f6c74b31503e260a76037b7d4bf3ccf

    SHA512

    d6155ea4b62299ed8dd941cd9454aa437a28a6e73e1b4846e18f80fa259ab2a9f819bcd0a8e1cc99ed0e2ae2d8ab921dd041018a08c70bf8a2be44ec0a9442ff

  • C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\estci_l.bmp

    Filesize

    3KB

    MD5

    7df755f1fd4936268507acba151bdbfb

    SHA1

    88244f9f5b1188ddb7cba16668904ea7c8c8c847

    SHA256

    129e7c9241e303ee196cda84fb67ccbd58de350497af64140189189f0e46c598

    SHA512

    2c64e8a7414582c36f3a793c82b64864e0f56c6a8bac5f7bd2ce16b0692c25751383d640749926d075608b8a8827d272a6e6a5d74cb4e89e341f24994d85bf6a

  • C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\input.ini

    Filesize

    3KB

    MD5

    c1d6b84db278fe1716ba3fc68f225b4e

    SHA1

    720efb690f7a4028341da72787f92183612318c0

    SHA256

    8d6dadb7a20ea2cc492d7cb1034ad68d2ac2c291fdd4463256c3588e2c929342

    SHA512

    7f91248db8b8ff8a6b1c8492ea40c10dc4fefb0861b86638f80d3130c29bf1f43c695be22f1a79cd3d19ff44d495d6e72a6b2d6ee4432e31a04f44afdf1ba07d

  • C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\input.ini

    Filesize

    1KB

    MD5

    2d4eeb351bdd8bcd4727f9acf8eee2f2

    SHA1

    e4f2af1829eb65957f8d5ed88b53770b274c0e9f

    SHA256

    dd6932af1cfd044900f319c66f4015343b6c93771e52c29918ced5fdb79cec08

    SHA512

    31a1b3eed57176421b54b46deb94a2d0b3ff71a112e0939c99ba2dd57cd1ebfe8195bed63db18b7fb06ea2663ceef8d58081fec9fea2498426f234ba43ca928e

  • C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\instro_title.bmp

    Filesize

    5KB

    MD5

    e7ee760c7197832923d16e7066b47814

    SHA1

    48f9ca2f31ebcbd638c7fab602b2ac1094acdf0c

    SHA256

    79ee8e2762f9edbc0eb76ed6f3fc0cd05ceb8a776d0684c71d44b8abb39d8e40

    SHA512

    5f4b79eeaa755ecb184d7b6ea4a4e568435c8a95ea721673c553c59a5208aad7cf8eeadb0cb934f8308caba6e66090046bdbe83b90f67d3d2025445618ff8518

  • C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\intro_icon.bmp

    Filesize

    25KB

    MD5

    e7dbe79c26db8f4b4be7bcfc37c13298

    SHA1

    82150b4c51b51da27360de54e450aa58a4d6ee68

    SHA256

    37752f12c27eff16f03226a4df11fafc50d94be94040e1317f81f3820b43c3ee

    SHA512

    7c4a89fb4c4fcc0dcc83228eb6cb70e282b7c1baeef7f70f527fcebee49bcb8e6e741d8b3e057fbf604e014d1a79daeee587e6f0e12d403ab8af10b6ece761d0

  • C:\Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\lic.rtf

    Filesize

    21KB

    MD5

    f4bb786568837e88014b62e81b7ec6a3

    SHA1

    358e4979622bc4d2ce30cf8ead5a80b97f3c740e

    SHA256

    62849fefefecfaed616192c691481f1c3844c36eb25baafa5a9c312d223b1c28

    SHA512

    79d91bb49ecfb522eaf660cdeae6c6c7618444f69520a71439a898aded1471ef28b3ffaeef18bfc9f83da9dfbd0037a8b00ed98090b3eae910c870953442b703

  • \Users\Admin\AppData\Local\Temp\nst1863.tmD\EstUrl.dll

    Filesize

    181KB

    MD5

    2c5e13287d27b526c01aace7ea92be9e

    SHA1

    3b7895f3e3f9dfa9797d2cf04ad7d3d5548210e6

    SHA256

    986ea6d67ded7e67cefe739902194751643982293154ba496d4b5076e0df38e4

    SHA512

    51702649d7ccdfd90a1b7d06699d0791ed60fa2419013deda826cfbfac57231fb06000d1e8a3bf866459ad8597393cdf95e559f575dc51c236c3205c69bc36b6

  • \Users\Admin\AppData\Local\Temp\nst1863.tmD\System.dll

    Filesize

    10KB

    MD5

    b666f31c4c24be1d4d47cfb55dd35f96

    SHA1

    fee917ead511a6c14538c72539fa740edc7d82c5

    SHA256

    07aefeeea75705edcc3a21ac7dc4b5b837c234c041b725c245b50a73ffabb78a

    SHA512

    6dd69a085b6b2a2671ec6545bae27a72151457ccd76c3bc43a4544f4910fd8791251fb08c2f068d54dd91a6093bed50a80afb68875a9ddf29ae43c42a7337bc8

  • \Users\Admin\AppData\Local\Temp\nst1863.tmD\UserInfo.dll

    Filesize

    3KB

    MD5

    6717338e4e0f6283ded89d771c849260

    SHA1

    aa7dcc18d6bf3b2fb0e74466fb2a5d60cc8aa60c

    SHA256

    2d0f153a0a09bb6217cccf3d015100f80216e717bbb9e00eb2482a0964a9c361

    SHA512

    5e3e8c1ce87edf8bfb2556dd5672e1c1e9e37e629fc013167a93fded04e65b79c9b6b192b252daffe45c6d03480f825e1fbf998064edd2771cbce925d85d2280

  • \Users\Admin\AppData\Local\Temp\nst1863.tmD\nsWeb2.dll

    Filesize

    197KB

    MD5

    d8113c015116547827b0cdc4869c244a

    SHA1

    82392f5483c6c175b3955cdf39aa87d550266ecc

    SHA256

    b7baa631014fbda8fdce67c8b660de8507aaee9b8c572d21746b3078341d3885

    SHA512

    907c61006a58dcafa812f03fa08b58814950f66e9019bfcc12eefc59b0f7ab2ddee040e2ab162b7e09c3f47cdc71c914307a6fe7b89e11033edea7131fc2f563

  • \Users\Admin\AppData\Local\Temp\nst1863.tmD\stext\stext.exe

    Filesize

    645KB

    MD5

    6284606ed3cde0677eed03e9a9e7f063

    SHA1

    e59a99dd2d51fd491adab51a9f08b75bce82c3b2

    SHA256

    3e4e33e0a0b65e5546604fbcd83014fc3d467eb16a3d9cab0e53284ceb9616a9

    SHA512

    c535b8e690e47f11609f84ac494dbb301828f367e0a914263463d29d412c1cdba422767b9f3aacae272e63cebbd22b707577d0de9d566bd96163fac633371b7b

  • \Users\Admin\AppData\Local\Temp\nst1863.tmD\workerExtension.dll

    Filesize

    549KB

    MD5

    e22882c6a4f464b95f0137dafedf18be

    SHA1

    11e845fb4d6c56c63814346c854e89b9138b2fac

    SHA256

    31c46010d24673fcbfcc0f17dceb5fd72520fc92b6a43ae987e35786a50961f6

    SHA512

    d9bc60317c64679f7e95142b10e154be014912aed551abdb871f94b5d14ac3c918b54b281b5f4fb2f00c1761c089ac56e2df8f99ddfb096a9af4a28d1cfdbdb0

  • memory/2420-17-0x0000000002150000-0x00000000021DC000-memory.dmp

    Filesize

    560KB

  • memory/2420-38-0x0000000002C90000-0x0000000002CC0000-memory.dmp

    Filesize

    192KB

  • memory/2420-9-0x00000000006D0000-0x0000000000700000-memory.dmp

    Filesize

    192KB