Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 07:24

General

  • Target

    27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe

  • Size

    552KB

  • MD5

    27b7f18f30f2b476f82b125c4c1f82dd

  • SHA1

    c5c8711cd86a8d8ab893d69339d7d7636a09591a

  • SHA256

    76462ae7e52f20c9e440e0475b44741146e3ae17553afe473d0d56decdead49f

  • SHA512

    75d00e02008add5931a3b768ffbf8e02b0cd22f207c7a69cba41cce54a4d1caa04fa41e8b4535fef7976c88dbcc140805ee2e9a85f1b06371242c9b55de78ef5

  • SSDEEP

    12288:ILtcLzJxRfzAVTaB0UW8XUQz3X/bTxj86nscz28V:IiJxag++Bz/b9jjscr

Score
9/10

Malware Config

Signatures

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • Nirsoft 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27b7f18f30f2b476f82b125c4c1f82dd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\nstD5E7.tmp\google earth pro download crack.exe.exe
      "C:\Users\Admin\AppData\Local\Temp\nstD5E7.tmp\google earth pro download crack.exe.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2020
    • C:\Users\Admin\AppData\Local\Temp\nstD5E7.tmp\Hxkds.exe
      "C:\Users\Admin\AppData\Local\Temp\nstD5E7.tmp\Hxkds.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nstD5E7.tmp\Hxkds.exe

    Filesize

    99KB

    MD5

    f4c84fb4f0596f0eddee2f8d3fc62215

    SHA1

    ea718d3c298d2d620f9b56a2d60efdd693b042f4

    SHA256

    cdc3d8732d618a44f162eb1f1e0fa4a745bf7f256e2bddb953de630908f3cd5b

    SHA512

    44a39271ef42b848f56e609f60f9ce042074eb0261926aaef972cc08958b6212a4dec7bc57f1a55f197bc83a99e76b03804f4534e463922785ce5abd956aea54

  • \Users\Admin\AppData\Local\Temp\nstD5E7.tmp\google earth pro download crack.exe.exe

    Filesize

    529KB

    MD5

    51c2daa26f14d3483093755b73aa3fc6

    SHA1

    ca2acdbccdaf66f61f6f70c4b335867074555a7e

    SHA256

    1d67062fe7c7e027e883543aa7205a4f7de9d74f8db24513359e6c276f051d2f

    SHA512

    ae22a9415e44e029ace7883d9bfb67e6b5033c8a97f637590711c88f44d2542ded93e211484a097e8b20672b81f2065e8a9a2b6144383a0c2e4424e390a1770f