Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08-07-2024 00:38

General

  • Target

    2a5e3f17fb10a4563e7596f1a163c885_JaffaCakes118.exe

  • Size

    703KB

  • MD5

    2a5e3f17fb10a4563e7596f1a163c885

  • SHA1

    faf136b60cf0bd620cfacf7e2cca0eae085eb00a

  • SHA256

    737dac882bbacfd5b483c79f559d4214cd06a45cfc21995acb21a496bf2f3254

  • SHA512

    5bc77f3f225d7ec0baccd786661af03114395d44a760b55052970de41a9997f4fdc934b30945be7a1c855f70a1d40071c7dca4642c31678f7c7e7d23a79356e7

  • SSDEEP

    12288:Sn3HSdtYaKtTRt9qQqn+oOaU3EfCuQLVOfpH5dZW04w9m8346dysK/Gq:S3ydtYRtdqM3BpohNWcRo6YX/Gq

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 7 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a5e3f17fb10a4563e7596f1a163c885_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2a5e3f17fb10a4563e7596f1a163c885_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nspDECD.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nspDECD.tmp\UAC.dll

    Filesize

    13KB

    MD5

    29858669d7da388d1e62b4fd5337af12

    SHA1

    756b94898429a9025a04ae227f060952f1149a5f

    SHA256

    c24c005daa7f5578c4372b38d1be6be5e27ef3ba2cdb9b67fee15cac406eba62

    SHA512

    6f4d538f2fe0681f357bab73f633943c539ddc1451efa1d1bb76d70bb47aa68a05849e36ae405cc4664598a8194227fa7053de6dbce7d6c52a20301293b3c85f

  • \Users\Admin\AppData\Local\Temp\nspDECD.tmp\inetc.dll

    Filesize

    24KB

    MD5

    1efbbf5a54eb145a1a422046fd8dfb2c

    SHA1

    ec4efd0a95bb72fd4cf47423647e33e5a3fddf26

    SHA256

    983859570099b941c19d5eb9755eda19dd21f63e8ccad70f6e93f055c329d341

    SHA512

    7fdeba8c961f3507162eb59fb8b9b934812d449cc85c924f61722a099618d771fed91cfb3944e10479280b73648a9a5cbb23482d7b7f8bfb130f23e8fd6c15fb

  • \Users\Admin\AppData\Local\Temp\nspDECD.tmp\md5dll.dll

    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • \Users\Admin\AppData\Local\Temp\nspDECD.tmp\nsisXML.dll

    Filesize

    12KB

    MD5

    aaf5a62051c11db6aa1a651bb9c295dd

    SHA1

    75413fd14a67a468578c9d8fbd1c0a810c5044d0

    SHA256

    55ec0f7d4c14b8b36e18203dad5604d066979e18017207f1165f17691845b161

    SHA512

    f35a6c4e133d5dd396cc326f7f7365483de0477629e290a91b2200253cf7bb39e0d8ab700eda66d88c7b5568cfac069d4a7b277400ad776d64611a3723362466

  • memory/2456-16-0x0000000000380000-0x0000000000389000-memory.dmp

    Filesize

    36KB

  • memory/2456-37-0x00000000004B0000-0x00000000004B9000-memory.dmp

    Filesize

    36KB

  • memory/2456-38-0x0000000000380000-0x0000000000389000-memory.dmp

    Filesize

    36KB