Analysis

  • max time kernel
    6s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 05:22

General

  • Target

    14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    14d0ce85ebabd71b9426cf06e1cb6448

  • SHA1

    61c58bf3126dbe6df852add395c9c6f528517b2e

  • SHA256

    9406d6bd0eb5a40a59c9b7e8f66bf693ab8644e163755b6be8305df4500dff38

  • SHA512

    f32b99293894ed4a7c09d4b2499e43cc7f5c0568b417fd16ac59ccfe0d06a02bfd235bd26098343a569d62612ab1c69078da180d8fb93b0ac91a518bb35a5c7d

  • SSDEEP

    24576:apWpQgiVRBo+U5lG4v5Zf1yk9R9epmbGePx6w4e:aApbyR2lG4vftyk9tRZF

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 4 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 6 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\14d0ce85ebabd71b9426cf06e1cb6448_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2528

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\QMDispatch.dll

    Filesize

    130KB

    MD5

    a9b857cd0348dc5f165522eca3f6801b

    SHA1

    488becaedcc40e8eb825cde97d478c36e7cfe243

    SHA256

    5a0636bea4ab20e58a48622aae72f8311754d142593bfddffe32c704977f8b4c

    SHA512

    0a6f8c8784cec103de4a333f4f195920a54591c9582ece0a9f6d1005444733ddc3d55501066f1d2aad3790eec28757adc8f02d4442680af6004a76432342173d

  • \Users\Admin\AppData\Local\Temp\BException.dll

    Filesize

    9KB

    MD5

    7dd8e8705a3f557d32be6d02afd7ff70

    SHA1

    991a4ea216d6255245a66bcf520e3e3953e57ba2

    SHA256

    9c9d689d96ea52820cd6d2293d4784a8d02916a264c6294777313c63b714bced

    SHA512

    01bf5ea70fa2446ddecfa87e8c2db02fbc2d36d3fd56b8eb1c4ee0e5dc230e5a743a3b1bfce49df8f615824faa7ed06d1bca929128942e4668e1ddeb2af592ea

  • \Users\Admin\AppData\Local\Temp\MSSCRIPT.OCX

    Filesize

    100KB

    MD5

    656524b4401f21e2929b78ef4c36db27

    SHA1

    d91ff837d6ced5f0442fd0812b6c1079fe417906

    SHA256

    d493f101ccd1d8804c0981f4fc630718b267d7155bdb575d6f619497956ea44e

    SHA512

    d28b17c924fb5f172944c055a85003575300305eddbbc4c89460777108c87154622b39515ee1f994d713d790fe5b74a69c835bd00d0affc5292fa0150617c34c

  • \Users\Admin\AppData\Local\Temp\WinIo.dll

    Filesize

    184KB

    MD5

    e672bb14a3c63dc0b3635fa42f95a7af

    SHA1

    504b07b3c53c5c2e19fdee64a0233a4727dcd1f0

    SHA256

    b70108dcc385ec18600fbf2abdc026adbef7965be68f68b7a86b359eb2013a0d

    SHA512

    217ca05630867d63df760c83f2fe1931245415ba34bbb1f4c118cbac74a3a3f06bd68ad79240aa23ddfaa347ceec2174874e9604087c6d1477ff70c3df0ae904

  • \Users\Admin\AppData\Local\Temp\cooper.dll

    Filesize

    416KB

    MD5

    00d07f5d8d5d89368e6f958f58d4fd13

    SHA1

    6a632b7e0b42550acb35893783390caece4d4344

    SHA256

    17bb033cd387928a2f3b61753ae3d7fc222dee50ec3ad6533309565f4f72f270

    SHA512

    bebe8ccf0fa23e75b283436bf7249837ecbbb7ad5ee53f35727f3bca5f5027519d6aa44e408cbae6dd6dcf16952c373e265cbc74c96ccbb94ea892cd1d3be026

  • \Users\Admin\AppData\Local\Temp\helper.dll

    Filesize

    20KB

    MD5

    87e96b9b1540adb0c01aa48947967666

    SHA1

    cf630e13f5ce321c54de09d6ed24792282b05aa3

    SHA256

    f02409b2e367afd0e585a2e1c6ac4d10790fab5292d8d1c2b866fe04fab28d4d

    SHA512

    0b0fd2d03eb7fb255e283b387b2dd08390ff1ce5f0d47ee5a698b809e73e1c4f484c6970817c64af00531ac938ea5f1970de2a2ccfca769f135adc011e96a3ce

  • \Users\Admin\AppData\Local\Temp\vuiyq.dll

    Filesize

    23KB

    MD5

    f404fd8e46f36d4d36bff5effbd0a260

    SHA1

    083bb57ee3d2bc4329dd255c69f43db370a14f59

    SHA256

    edaba440dc05ff9ced592e9f8efcea6675b8b8980b042686844ae47ba5946e87

    SHA512

    23b170ef4bee55dee84783893cb94190e27f21cfc48314d3bfd9ffeac9e7154d5c5fb69c3718450dbb62be726f5db63c8c0cbff7b99ecd9c885f5fb6345e95ba

  • memory/2528-22-0x0000000000720000-0x0000000000789000-memory.dmp

    Filesize

    420KB

  • memory/2528-10-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/2528-17-0x00000000003E0000-0x00000000003F1000-memory.dmp

    Filesize

    68KB

  • memory/2528-20-0x0000000000710000-0x000000000071D000-memory.dmp

    Filesize

    52KB

  • memory/2528-33-0x0000000003030000-0x000000000308D000-memory.dmp

    Filesize

    372KB

  • memory/2528-45-0x0000000003070000-0x0000000003084000-memory.dmp

    Filesize

    80KB

  • memory/2528-51-0x0000000000710000-0x000000000071D000-memory.dmp

    Filesize

    52KB

  • memory/2528-49-0x0000000000400000-0x0000000000612000-memory.dmp

    Filesize

    2.1MB

  • memory/2528-57-0x0000000003030000-0x000000000308D000-memory.dmp

    Filesize

    372KB