Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 16:24

General

  • Target

    0992b3920077cb7933f891f688103ff7_JaffaCakes118.exe

  • Size

    2.4MB

  • MD5

    0992b3920077cb7933f891f688103ff7

  • SHA1

    0e2ed646a46c9910d40615fd313833f7dd88f767

  • SHA256

    2a0784fec18355082a5a571434d94dcfee2357692b4ff3ce0b92e6d2bd91b2ce

  • SHA512

    200947ce34d7aded1acb694c9ee6474c1e2285d2e3887d25160991b1f77f650110aa0b9367005ffae90f0eecc1660b2eea856afd31777e29ff56ddb15baf10dd

  • SSDEEP

    49152:D05W2bBAOVDldB+EX8TKqvH8woarAROt9f8nlpgNoAmrSlWrxMNWAwAc/:A79jbdBb8TKsH8paV9EnlpgCSlWrx2WR

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0992b3920077cb7933f891f688103ff7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0992b3920077cb7933f891f688103ff7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsi1ED7.tmp\ioSpecial.ini

          Filesize

          735B

          MD5

          d2821262adfc41570400dec109936a67

          SHA1

          ddf72979fc45d636213ba15deed75df4b62967a3

          SHA256

          45770dc18fa4cd73ca98ddcecdb7d1baffa9acd78303838792779f8574b35436

          SHA512

          cc07a89dbd2497352e5d62486028cffb4eaae799ef0f38661c8181ab144c78ab0071613cca9995ea0a35d7c648258cc360278a9c0a92a2633ba71b6a93fa8418

        • \Users\Admin\AppData\Local\Temp\nsi1ED7.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          fa5beae80dba254fb6c21b58265f5310

          SHA1

          f2f776611dbbb157b151aa744a7e0be1d4b8c079

          SHA256

          34b8a2130729064ca2f9b3b8e6f90d883d84662156b648a4eeccefefc3473269

          SHA512

          7c74b9e9f1ff0665ffd6fcf76fca462d9f4fbd7c4a215bc67b419497ef4c3cb9cede6c5b0803cabb316bc5391c4c6f0d578d36e1094b8ed326b140f8e272b538

        • \Users\Admin\AppData\Local\Temp\nsi1ED7.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          7eaad8c651cdeb4a71355b10dbe8d17b

          SHA1

          1ef6cf4f98c7f20238e548dc6cdb270b741cfe8b

          SHA256

          fad96602241e65daeef96b559092e7efa2c3b68948a65f1bd7f126b9963df468

          SHA512

          6f7867774bfd82b1d12d0db5479e9539440ebfc6fee54aafc4381edea8fdccb89a9521a60b5f907033c147c805e6f541ec534c56bfe5f7354c55ca04df5175b9

        • \Users\Admin\AppData\Local\Temp\nsi1ED7.tmp\UAC.dll

          Filesize

          17KB

          MD5

          09caf01bc8d88eeb733abc161acff659

          SHA1

          b8c2126d641f88628c632dd2259686da3776a6da

          SHA256

          3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

          SHA512

          ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa