Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/06/2024, 22:35

General

  • Target

    031d072c531abcf719f69ffb526f804e_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    031d072c531abcf719f69ffb526f804e

  • SHA1

    775c41e27097d1bbd6aab1845f105ddaaec17cc8

  • SHA256

    da7d05d868f1c05cd97ca32d30620253a10034a1f271bef9db5fa3f5e693b929

  • SHA512

    5c38e8d4dbb77e23c754c150069f0d939f5652c86c95f746fb5f2d3d8e7ba5f475d6add8f1472a0ee81908bc2fd82fdc45b1c27a2851735c4c428652212e1185

  • SSDEEP

    49152:D2c/RGx8qEyPMxXn0DPDv8Kq8bIBXFbVR/yyqBDZ2ssO/M:qEU8vyP+XnAr0Kq8bIBVbypDZ2S/M

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\is-J58O1.tmp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-J58O1.tmp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.tmp" /SL5="$40112,2408487,52224,C:\Users\Admin\AppData\Local\Temp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-J58O1.tmp\031d072c531abcf719f69ffb526f804e_JaffaCakes118.tmp

    Filesize

    662KB

    MD5

    b45570ddb00885bfe9e878af91a90564

    SHA1

    66daf059333962a65735999e99eb868cf9d5e832

    SHA256

    29fedae831f5b1704e5b53351cd6b8d33a21b7971894a9d0385895d7662e264f

    SHA512

    84350f30f9372be749fa244190b7d35a02aa2ce1ded9b45d89c29135a384e1170a54ef1af7004836ab9c30770a44f7e085b0cb238786a6d93d7e8cdec993d768

  • \Users\Admin\AppData\Local\Temp\is-VS538.tmp\_isetup\_isdecmp.dll

    Filesize

    13KB

    MD5

    a813d18268affd4763dde940246dc7e5

    SHA1

    c7366e1fd925c17cc6068001bd38eaef5b42852f

    SHA256

    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

    SHA512

    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

  • \Users\Admin\AppData\Local\Temp\is-VS538.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/2676-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2676-3-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/2676-20-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2844-12-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2844-21-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB