Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 12:08

General

  • Target

    94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118.exe

  • Size

    789KB

  • MD5

    94c8b59a462b684e2bd6b73fb700289d

  • SHA1

    64aeb33d6651354a792cb0f2ceb44ad115b0855f

  • SHA256

    56df1d170aaca7ab54e67a88772c27095cefd728fea1a227d058c1d6dbfdb8c3

  • SHA512

    45b5ec902a067331f66f2d14b36892d24183a5c799dac181a0c5b5869cc236983a46004e1e1dde870e70fa5f07f4647dbca0723662565b24abaee15eb0a994fb

  • SSDEEP

    12288:3tobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44V8:3t8RHjEgYAw1hZlZTWQu7igcyKPEuja

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Local\Temp\nsd2667.tmp\internal94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\nsd2667.tmp\internal94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsd2667.tmp/fallbackfiles/'
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\21566.bat" "C:\Users\Admin\AppData\Local\Temp\3D013E923BB34E99AFFED2E8B0986E8D\""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\$I2Y2YKY

    Filesize

    544B

    MD5

    d954d37dab3dbdc133d4d5517c49960c

    SHA1

    0f0a1f8be8ea0446d7f0cd1eeb6f53eb5bb3d6a0

    SHA256

    d92476abeb5a64081c0029e6078e7d838f9ecfaeb3a953e4fd836161c268eae9

    SHA512

    1b048ee4201256dc160cc02b96e6bf809da1c3987baac49d49de685eb7588380725651b36585e62efdd9f51147014eee77ae8c19fa3f56595ebe164cbd8f796a

  • C:\Users\Admin\AppData\Local\Temp\21566.bat

    Filesize

    212B

    MD5

    668767f1e0c7ff2b3960447e259e9f00

    SHA1

    32d8abf834cce72f5e845175a0af2513b00504d8

    SHA256

    cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

    SHA512

    c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

  • C:\Users\Admin\AppData\Local\Temp\3D013E923BB34E99AFFED2E8B0986E8D\3D013E923BB34E99AFFED2E8B0986E8D_LogFile.txt

    Filesize

    9KB

    MD5

    6931a5d7d41cca7a687a7f990054b8f1

    SHA1

    aeb86f318c89123b1e6f526ded5975a4fe7e6ea6

    SHA256

    fb7f2d5807d49838e0734911a4b41cc5b537ebc953a957704d0bae339c45aaf0

    SHA512

    9bcee5d51aef8fb9b2e99aa788ccfbb00e96b05b0d3c06b91d1bf608be02ed3d442f18fe27604d859caac68c6531291f7a6233f862eaafbb74d63d831c303e8a

  • C:\Users\Admin\AppData\Local\Temp\3D013E923BB34E99AFFED2E8B0986E8D\3D013E~1.TXT

    Filesize

    106KB

    MD5

    e958c8665f78453c286d14383d6d1def

    SHA1

    d73f3ee09d67322bd31030d5402e63f8eaf80b8d

    SHA256

    4d6c4ed9d2b07ed7c273deca86864b6ba61bdf5e783cf4ba011354c7045be286

    SHA512

    488e5fb4918dbfb6d269ee2a61341ef35432ef608c5a41bef541e94006a83eba2a2b9f68045c2c15c3d7738fe6a1c800b8011ae89b5f2c3e3593be62700e2b33

  • C:\Users\Admin\AppData\Local\Temp\nsd2667.tmp\internal94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118_icon.ico

    Filesize

    17KB

    MD5

    055c2cb77fa2edc2802b7fd397b9c213

    SHA1

    e6bf5af3427539bf609cfb8904b35803a06104d3

    SHA256

    78d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2

    SHA512

    7dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65

  • C:\Users\Admin\AppData\Local\Temp\nsd2667.tmp\internal94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118_splash.png

    Filesize

    12KB

    MD5

    fe272d040e82704707b19bfbf29d65ca

    SHA1

    460de628ea63986a7e6390a1623d8ba32dc82aee

    SHA256

    1cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983

    SHA512

    8a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b

  • \Users\Admin\AppData\Local\Temp\nsd2667.tmp\StdUtils.dll

    Filesize

    14KB

    MD5

    21010df9bc37daffcc0b5ae190381d85

    SHA1

    a8ba022aafc1233894db29e40e569dfc8b280eb9

    SHA256

    0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

    SHA512

    95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

  • \Users\Admin\AppData\Local\Temp\nsd2667.tmp\internal94c8b59a462b684e2bd6b73fb700289d_JaffaCakes118.exe

    Filesize

    1.8MB

    MD5

    9ab5db4bb5971035b4d287d64f9676b5

    SHA1

    33d17f016339572dd05c124d6243fffefd0cd039

    SHA256

    f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209

    SHA512

    d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066

  • memory/2064-81-0x0000000000980000-0x0000000000981000-memory.dmp

    Filesize

    4KB

  • memory/2064-203-0x0000000000980000-0x0000000000981000-memory.dmp

    Filesize

    4KB

  • memory/2104-289-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2104-125-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB