Analysis

  • max time kernel
    92s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 01:03

General

  • Target

    900b913b56c2f097de8a4666f5df9455_JaffaCakes118.exe

  • Size

    304KB

  • MD5

    900b913b56c2f097de8a4666f5df9455

  • SHA1

    b4623f1687c8633fa9abd187f1fdf3593e879046

  • SHA256

    109b9155de52d9f4592695060049279ae79d301f1fc0ffa5c59fc436589c13cf

  • SHA512

    5cc5240c82c84711f71f9fd07961037ee9f49c7871c4bb2c94d46aa288697710dd1b497302863522a71d0d24041f74ec7ffdc4ffb03d562d9ffcf4d7ffa3890b

  • SSDEEP

    6144:Yrkw6Y0JQBkQRl7174NpNUM+UHs+tPvpqvpQAy+L9hMk+W60z4RRW4:Yrkw63yRl1uqM+gs+tPvEpPy+rMzu4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\900b913b56c2f097de8a4666f5df9455_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\900b913b56c2f097de8a4666f5df9455_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Tsu29957282.dll

    Filesize

    269KB

    MD5

    af7ce801c8471c5cd19b366333c153c4

    SHA1

    4267749d020a362edbd25434ad65f98b073581f1

    SHA256

    cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e

    SHA512

    88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

  • C:\Users\Admin\AppData\Local\Temp\{93588971-7608-43DD-A136-3E2A48BBAB87}\Custom.dll

    Filesize

    73KB

    MD5

    56a2a892987268718445147b7ddd0a98

    SHA1

    d56fe3883d4d286322981ea07d027554ad52a955

    SHA256

    5a5245919bb55d392a5e45563af2dc22a15a48a6e9e70b964b7ce339eb02a40f

    SHA512

    ef0d74fb6747006f9c997e6a43beb4de7cf72fc19000d7949da2c1a6251b9c07aa0c082a549a0b3d3e4a2f5a62682e0346ff8234457ba385488ef874fc600401

  • C:\Users\Admin\AppData\Local\Temp\{93588971-7608-43DD-A136-3E2A48BBAB87}\_Setup.dll

    Filesize

    167KB

    MD5

    dc4d3ad609418f3941a2b5321944f80b

    SHA1

    b00e079e20a7d6bb3695407063b16a56b9de4eb0

    SHA256

    1681c8e8a8233e3f564afebe035cb912f367233a855046241433ddd06abf17bd

    SHA512

    291bc20ec28faccf8080150e9ff98ebcbc4a6e81290ba36367ab3c77d8dcf7be437a6eaf47586a527665332d185b41f78b6850d756a370db69a95da8425e349d