Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 13:17

General

  • Target

    9e4e62a0a066ac3a251b823def1ce4b0_JaffaCakes118.exe

  • Size

    936KB

  • MD5

    9e4e62a0a066ac3a251b823def1ce4b0

  • SHA1

    68f15b4eecacb8e0ba7d95e08ef864a162af192e

  • SHA256

    3635eeabd3ee2766f71d78f0630ad212708c1f40bf638fc63a73d2815b57e830

  • SHA512

    0d25010ae315fb6fc0a298ed1fc3ce1edd0181cb79214852282fc2bd143414174481bcce59b6e50cda4ab01ebb816757247204efe721985b57996a75e30d99b7

  • SSDEEP

    12288:xC7ikm/qMXH73hAFK5Q8MB8dTNWeqHHm+fKedGmmZ9axd9Wg7x4sRYiyXIr7Yd6Q:xC7ikYRXvM6x5IV6B8cn6B3is2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e4e62a0a066ac3a251b823def1ce4b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9e4e62a0a066ac3a251b823def1ce4b0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst9E73.tmp\ioSpecial.ini

    Filesize

    545B

    MD5

    e4d431081a1138c404ce4dfb593e07ae

    SHA1

    5091c82f636b04834d93d514436bdffca95a23e6

    SHA256

    1d08fb336fecaa889d1d45ecb7e6947324227ede89273d5b126c30095d11798b

    SHA512

    ac8265574db83d4b75b514981d1861c867fafc2daf740f337093fb49a2d1d100efa5fcf17b0282ab65bfea60bab550fae09b332bd60042229ca555d82e5fbe0e

  • C:\Users\Admin\AppData\Local\Temp\nst9E73.tmp\ioSpecial.ini

    Filesize

    584B

    MD5

    d7c9d13e36118b74e953e566dee84ad8

    SHA1

    5c492c28cd91727ee5f0339336ff6a92245c8574

    SHA256

    92d6e99d4f8a887bc38e783673740d9f2f142c945bd51d6b16bc02a544916713

    SHA512

    a29395001dffde74a405d1c47a36920b51fc35216bd2f44ca5292156497dbd41e4785916c796888d7832f6866c5a6ccc1f1eb941c2c423b8fb1f36cafb6c676a

  • \Users\Admin\AppData\Local\Temp\nst9E73.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    d753362649aecd60ff434adf171a4e7f

    SHA1

    3b752ad064e06e21822c8958ae22e9a6bb8cf3d0

    SHA256

    8f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586

    SHA512

    41bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d

  • \Users\Admin\AppData\Local\Temp\nst9E73.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3