Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/07/2024, 10:21

General

  • Target

    26d967df87656e595072c2ed36f8897e_JaffaCakes118.exe

  • Size

    312KB

  • MD5

    26d967df87656e595072c2ed36f8897e

  • SHA1

    03c2489f3b4fad50c3686627cd51c232ca4c436e

  • SHA256

    996cd6c529fd6fcb1150408728edf123b8cb7903200b3a0d7751bcc7f344b526

  • SHA512

    cc5d879080e8a65066bf471574b39d3e6f5b26454f438678658d6044fe78496955bd1d2a94556b1efc9d062cb0f9d7ec8437bf4fd30baaf7d622dea40bfc963e

  • SSDEEP

    6144:qe34pOw0wpdmtuuRL7ZM/0KCjHpGy9jBZ0XmBy5hRJGy9jB6:Y7pstv17+TCjLxBC2By5PxB6

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 4 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26d967df87656e595072c2ed36f8897e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26d967df87656e595072c2ed36f8897e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsd1C48.tmp\ioSpecial.ini

    Filesize

    682B

    MD5

    90e68046f9facf5e52aebf99b9bfb906

    SHA1

    6bec9cdf3e01d0889cd31fc96bae368754b146c9

    SHA256

    36b6b8496c1191fc5999e9d38db615835b44ae2075880659eef33137c8dc4b4c

    SHA512

    d3935aea864fc8a356808b6b99bb7779f9592c69ea99ef426041c614607728e7513204b5e521e1104b40297f723718d01828700e94243dfa54bcaf3180cb98ba

  • \Users\Admin\AppData\Local\Temp\nsd1C48.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsd1C48.tmp\KillProc.dll

    Filesize

    24KB

    MD5

    f2223ee8d3b5a26d9386dd90fd6326cd

    SHA1

    edf24705bba2a459637722af3b7a8b7bac23d2ed

    SHA256

    488aa34c7d2da0ab4a6b50463d5bb7fb402493602d3164bd1d56a2e93d97237e

    SHA512

    59bdc5368c9dbcee3f7807a653618becac2c36ac4b4c5b3e8906f32e55ddb0620af30e1c771bd9e3145b7caf996c1cc439066e1ce17cbe6f3ed9248c2e6e4428

  • \Users\Admin\AppData\Local\Temp\nsd1C48.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsd1C48.tmp\UAC.dll

    Filesize

    17KB

    MD5

    88ad3fd90fc52ac3ee0441a38400a384

    SHA1

    08bc9e1f5951b54126b5c3c769e3eaed42f3d10b

    SHA256

    e58884695378cf02715373928bb8ade270baf03144369463f505c3b3808cbc42

    SHA512

    359496f571e6fa2ec4c5ab5bd1d35d1330586f624228713ae55c65a69e07d8623022ef54337c22c3aab558a9b74d9977c8436f5fea4194899d9ef3ffd74e7dbb

  • memory/360-10-0x0000000002530000-0x0000000002544000-memory.dmp

    Filesize

    80KB

  • memory/360-94-0x0000000002530000-0x0000000002544000-memory.dmp

    Filesize

    80KB