Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 15:02

General

  • Target

    8ad4bf941fd3db9659915ac3ad4bd442_JaffaCakes118.exe

  • Size

    185KB

  • MD5

    8ad4bf941fd3db9659915ac3ad4bd442

  • SHA1

    71b6f2f4eba92face6f5fa01178252e222c783f8

  • SHA256

    d9d855847fb7bb8486266010286d403a20b7d267e613e37bbfa58bda2f4426be

  • SHA512

    eb91e7dafb39385f0dbef564b88ae69b522f3a612770ee721f8635e6ced209de8efef9df6f7b803829a3ab5e42b7137e6569056662bc4efa75243fbe78bbb2b6

  • SSDEEP

    3072:cX7DItrfaocyTgfsqQOlJiqHC4h7+2iSAXs0bqHV385GUO2yem692EfjkHK8qLOk:csaocyLCizkitXjm1385GUO2yemq2Erb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ad4bf941fd3db9659915ac3ad4bd442_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ad4bf941fd3db9659915ac3ad4bd442_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\nsy280C.tmp\inst.exe
      C:\Users\Admin\AppData\Local\Temp\nsy280C.tmp\inst.exe 50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe /dT131500740S /e5363260 /t /u50d1d9d5-cf90-407c-820a-35e05bc06f2f
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\nsy280C.tmp\50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsy280C.tmp\50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe" /dT131500740S /e5363260 /t /u50d1d9d5-cf90-407c-820a-35e05bc06f2f
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    1KB

    MD5

    2af2f004964305bf23851712c21ce9c0

    SHA1

    ad992b90510eaeb833a8a6de538dfe667a92f2e0

    SHA256

    b00391642165d4b3c50f5723bb5e9bfb00076a96fe344c542286f7a2e8e0f59a

    SHA512

    a15ba4f4ef935e6c5a58d5fa5521514de65d9d1dc1c24bc25e16130309c66791ec087c7b26cab19af9e57381a818890c494e4af935220db40ebecb689c9b3e7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    5a1ab1871c1dd0bbe715482943c74be6

    SHA1

    da4ce17e39abb581883120980f00a91cb029127c

    SHA256

    5fab31aa7540eaebb07d0315e540564b06d612b4b4eb3f2a645fd86a59e6b37c

    SHA512

    88d80e7ffc33aadb7e28363aad82f51e78bc09ef3ef193a7acb867c825bf633b04bb623796e699262c2f1b40f339bc5277b5520f17d87b2d1f6724288330545d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    5B

    MD5

    4842e206e4cfff2954901467ad54169e

    SHA1

    80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

    SHA256

    2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

    SHA512

    ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    412B

    MD5

    e8e07d49d72e6eb9f7dea46a18a61466

    SHA1

    b5c6e5c771f115e669a39dd91027bc2f5d9b090a

    SHA256

    6e143b42fbf214ea383ca0840630d7ad212ae9e8eb7f14b51bacc8d5e06add1d

    SHA512

    5921b15252a5415a269419a15e7a8b35a1e37b04d0b75cf87b7f3042e0f52e9415c8db1cd265bb3e97e8849293db11cd9b6768a1e280fc6abd88530d63054d67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    badcf52e3cbb1ce42a4fa7b44bcce07a

    SHA1

    b5a72c47ca6bde1f7c3c8389b7cd5c46eaac5562

    SHA256

    b0c39571195b5864988b1e82ecbaeaec8cf6a78c7567ca6e07b5721111292684

    SHA512

    3af9e788139d352c6a67601b90dac8b9b3e34c14e2eb4535b377c4c2759d7eaf5f32a7e2c4d02685fc1acf28f795c7d8ac404a2cea8eb8d824897dd206b80813

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79a88ad33adf3d55a8a16f1dc7126fba

    SHA1

    ba6a5c487ac7aa12465218e87d0e7f623d86b9f7

    SHA256

    1149b7426f609ce352674fa70421839741a05234a7d4209fd6db94c286b612b6

    SHA512

    162c76acbf8e80484a21c95d331701828b79e251982354303a4f92be5210fa8fde9e16e1b31e21c92822ca219c7ca87d17101fb5c7c384e79cbc57a3a291e6ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    404B

    MD5

    5fdfb910de9b672d64ae3c2be36e0a82

    SHA1

    4000b93e60631f04fa28c7e322ad583d9795d55a

    SHA256

    7a05c66e6902fbb9b1009f947c3b36eeaf3c0cfe616a0ff87e37187e70d4e186

    SHA512

    d16b48db827f4789f686a680eccc1db14876bb476172d7dcbbdb0c562b1f5b7fa7fb6aae4c8a81d4bdff7ac2f5ce2ff299033a9af863f6bfc50e4abf26127fb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

    Filesize

    482B

    MD5

    14043ee50ed9e88b119130488bde983f

    SHA1

    aa96af7dbd5857699a2e798171f3fd02ea9df653

    SHA256

    ab12e21b46362ca4b24e4f0a1dae8f0ff2be21e1d83e72d05b9d7bef29fe6f3f

    SHA512

    e38ccc4404e7bb98614f7e7dc7e2da9a3f17ec594b32bf6caf9e524e82751c4eeb580ce1e137771fa7cc13352406ffef95fc19de5b62971c033178c5d283b5a5

  • C:\Users\Admin\AppData\Local\Temp\Tar2A04.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsy280C.tmp\50d1d9d5-cf90-407c-820a-35e05bc06f2f.exe

    Filesize

    165KB

    MD5

    5906fff7fee2292644f3769e7acb5752

    SHA1

    af80075ab73575aa0301736a08430ddd30a45e99

    SHA256

    68a6bb6d526ee914542940174b38cf8fa166d35f8e4bb4d49bd16065cb1f46d7

    SHA512

    d4e6c9be580a292700da3178dfa4979e9e93853b477e9ccecb0ec093cc3ed86174e9f11ae940c4c65d7f2b6e1444aefc8efd0cbf6384a179c96d0a07c7419583

  • \Users\Admin\AppData\Local\Temp\nsy280C.tmp\inst.exe

    Filesize

    144KB

    MD5

    78c9beb846f7a1355f12474d880b2cfd

    SHA1

    dbb8ccf9114e97c1deb4da021863997d228ed04b

    SHA256

    b7ad932609760e6e4d8254d83b25d00a9114b112f77276c096ad8d62de6aff4e

    SHA512

    8b6722f6355b2cacccab6302ca141be7d082e3a1fef37672a06a8f5d25d7bc04fb6e64f79554a80cae9477d8d6c6d2045e7a6833bf142c4692c194fe0cb65987

  • \Users\Admin\AppData\Local\Temp\nsy280C.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/2556-93-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2584-81-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-78-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-73-0x00000000008E0000-0x0000000000900000-memory.dmp

    Filesize

    128KB

  • memory/2584-21-0x000007FEF5C40000-0x000007FEF65DD000-memory.dmp

    Filesize

    9.6MB

  • memory/2584-13-0x000007FEF5EFE000-0x000007FEF5EFF000-memory.dmp

    Filesize

    4KB