Analysis

  • max time kernel
    130s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 12:22

General

  • Target

    ae680ebf182bad9d6c5dc5297dcdb6d1_JaffaCakes118.exe

  • Size

    733KB

  • MD5

    ae680ebf182bad9d6c5dc5297dcdb6d1

  • SHA1

    017435ab8b17b85f6f0cf6e433d1a1e0229d9117

  • SHA256

    d4c3919ec72842ee308477798826f76fec77e2f20e862750b7cf542b385b0433

  • SHA512

    ce8ba8384dc02cb30342a75c0a591c97c5e3428501db10cb52409604f8ac5188687cdaf5a2025b174550933a78dd85cee984f1db726248ab9cb8c2f01f7cef43

  • SSDEEP

    12288:3EEShYO99Vv12R8nvwz7ap2GAKmozGBBvtGAXfmnoILU9TbF9jn8h:3HS999V928vwz7aw7vgAPZd9TbF9jnk

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae680ebf182bad9d6c5dc5297dcdb6d1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ae680ebf182bad9d6c5dc5297dcdb6d1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso1E0E.tmp\WelcomeScreen.htm

    Filesize

    5KB

    MD5

    54bbb668f02441624af5d536ad9dfd05

    SHA1

    6a4a1e9522658a725c3f4d2864a2087d33368db6

    SHA256

    ed7a47c63626fb0ad11635421592b3e805937ea04a94ca39f6864edceed708fc

    SHA512

    b7cd133b796af24a17345ba578bd03ea1de659f83f7b7d2b29bcf44ccbca376611d35fd0ec435083c8719f2e35cbab2d1afb2d9fdec89a3ef4302fcd715d439c

  • \Users\Admin\AppData\Local\Temp\nso1E0E.tmp\FDMClient.dll

    Filesize

    222KB

    MD5

    b8d9503e3c0ac31fae05382a2cc6197b

    SHA1

    f6085be74247af30c2aa79a63e8bd1f9667951df

    SHA256

    e57ec829e42342a1a0826c45a52e76b5cf038d3074f88b64b41dd75a367979c0

    SHA512

    8b926afbd47b42541e51e3eed65eaa7dffab3295d0ee1350174b187995e0d232e2c5b76e426407577c590d6a2418ef12e37bddc15438c1eeaed1e134feda8f6d

  • \Users\Admin\AppData\Local\Temp\nso1E0E.tmp\System.dll

    Filesize

    17KB

    MD5

    62008374a494afeea2ee2ae9eee4c8c0

    SHA1

    94808fcf0748c437f4d7ffa4d540e054cb014fab

    SHA256

    9c4affddfa97b268b07c00ac28a2fe617dda806bf55088ccf348da149ee76c1a

    SHA512

    f584ed647b69ff8ff80450be8f0b267ebb3c97826dbf01d078165ea94b43afd1f00fc58b91d9e8f4d78465d70312c1b1a6ac66583ebdc009b0ce471a6cf149a0

  • \Users\Admin\AppData\Local\Temp\nso1E0E.tmp\webapphost.dll

    Filesize

    1.4MB

    MD5

    502644b41549622acc7c5116620a22e6

    SHA1

    a7ce72ea70457478f244a3b9e04c5c61e72d6bee

    SHA256

    4653dcd1cd888e0ee00f9f5312523354384f7aa2b3cdd1fd4ebb7a1300faaf51

    SHA512

    cb236405d280e67262202d0f18acb5eee93ad5f0dbcb7207a267f6f8d8efd7042bb73b0f2ce8385c8f066976cc604830184ab645f09f9b930e31ad95c0e977f0