Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 23:04

General

  • Target

    268ea79d8c653e5ffb1214e078b30851_JaffaCakes118.exe

  • Size

    2.3MB

  • MD5

    268ea79d8c653e5ffb1214e078b30851

  • SHA1

    a43fa671ad566b71165e1e49ced68bdf4092604f

  • SHA256

    dcda925562e7590482c9d9049e8716475af08210b4e26405ad88c14bff5d8952

  • SHA512

    1df06dca4d46cdc64b3cb4902a738e33e1f58099fc67b7f2b33b352646d434fc0c9402fa789ce495d31eaf652e9d516d61e2fca683050f78c252c04b7eb9d2f4

  • SSDEEP

    49152:0VObmyiU7rFGbAQdnZ1pqogEi/5UyISYrsC8v4XBt9W+kI:00bmyi+BuASqTaJy4vk0

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\268ea79d8c653e5ffb1214e078b30851_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\268ea79d8c653e5ffb1214e078b30851_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso166F.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    cdf16c093dcf6dcfa2e6dced37891c5b

    SHA1

    451f600dcc91e91f0faded5de107aff2d1853554

    SHA256

    ce426c14100d711a3278782730798f26f7313290a11c342a8d4ab2d3944d4a2f

    SHA512

    6ab0a0e404707d7e8b3e77e5421e4a5fb48eff6266144416e8ccd8f94103f03d789b3c65697c34d100a2c1e062e49cd966ca86332e54961a7cfd5ff086a2c610

  • \Users\Admin\AppData\Local\Temp\nso166F.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    fa5beae80dba254fb6c21b58265f5310

    SHA1

    f2f776611dbbb157b151aa744a7e0be1d4b8c079

    SHA256

    34b8a2130729064ca2f9b3b8e6f90d883d84662156b648a4eeccefefc3473269

    SHA512

    7c74b9e9f1ff0665ffd6fcf76fca462d9f4fbd7c4a215bc67b419497ef4c3cb9cede6c5b0803cabb316bc5391c4c6f0d578d36e1094b8ed326b140f8e272b538

  • \Users\Admin\AppData\Local\Temp\nso166F.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    7eaad8c651cdeb4a71355b10dbe8d17b

    SHA1

    1ef6cf4f98c7f20238e548dc6cdb270b741cfe8b

    SHA256

    fad96602241e65daeef96b559092e7efa2c3b68948a65f1bd7f126b9963df468

    SHA512

    6f7867774bfd82b1d12d0db5479e9539440ebfc6fee54aafc4381edea8fdccb89a9521a60b5f907033c147c805e6f541ec534c56bfe5f7354c55ca04df5175b9

  • \Users\Admin\AppData\Local\Temp\nso166F.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa