Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 22:02

General

  • Target

    3691a72927d53f0d6c9b38343a0999b9_JaffaCakes118.exe

  • Size

    3.8MB

  • MD5

    3691a72927d53f0d6c9b38343a0999b9

  • SHA1

    1f853fb984a866185870c7462c0599083074e16f

  • SHA256

    e3697831bcd29abfaf0a2b7d74b5b42d0ebaef5625f45b617170bfeeade8af70

  • SHA512

    9377c3b7f48b0da1579f1dbdf8afeceec5700c4c39a68bf21a023083ca62aa36b9f1b26a6e8ade87305a573cb919b925adf303732d5317a763e385d28b7af468

  • SSDEEP

    98304:cjy0yKspLRuTv7YoK1T6zI6MBobSfu1oiBar/peNj/N:ggLRc7YocSI6AxWWibN

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3691a72927d53f0d6c9b38343a0999b9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3691a72927d53f0d6c9b38343a0999b9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsyBF3.tmp\ioSpecial.ini

    Filesize

    610B

    MD5

    abf266576fd6f7b91543abbe9d5061da

    SHA1

    0f40f061a5f9aad164f1cea690c125a60e41f38a

    SHA256

    e2343a88e320bc45dc1ed797e0ae971e3c832b66b8f47f4577205940f878b526

    SHA512

    3770d8dd5b38f611c93211d526a5de47daa46571f3f5b59aa5d51c5a72906c95b47785efdde22c64c739351eb2260b6c3382ee1a00bcd1e1fc8b76d060db3a81

  • C:\Users\Admin\AppData\Local\Temp\nsyBF3.tmp\ioSpecial.ini

    Filesize

    649B

    MD5

    0ccdaa60975ee7ee061d413ad999b27c

    SHA1

    e8563655c6086d34ba9a11077d49b2b08d821954

    SHA256

    a58a5578acc5f61ca43b42bc9f7d734a371aaa1831b579e772bad3b88a7c55a8

    SHA512

    7485081a2e628c90ebef8986b1414a3b3a91426fd77e2edebe31ba866b40fb1303d87f77fd48290b2972d61bb054d9db9194bbbd2c45b5f09a60314031ceb951

  • \Users\Admin\AppData\Local\Temp\nsyBF3.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nsyBF3.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf