Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 15:59

General

  • Target

    3e06a712c6d5ffc1925839bfa2829ee8_JaffaCakes118.exe

  • Size

    3.3MB

  • MD5

    3e06a712c6d5ffc1925839bfa2829ee8

  • SHA1

    1545d3b2765d02b0b599adf2a7d1b4b10c55b1b2

  • SHA256

    e3700da64eb073a95b0b3d4306c4a77c4de6c02c954a545bb63edbc3917c88f4

  • SHA512

    5af1ddaa2aa413b41825de35e4b40838587551c9e7478836b117a9c5f20ac4bcdb1820c15efc5ec413354a3f0ce0e58d79cfa800c7e5adec5a10a7912fe89d92

  • SSDEEP

    49152:5w1bkdEF62K1kixxXexH1KKxrpQpE7vWCTdAD8a+YPmvmJ1sdeKUtpYsvqmZRukl:5ak1PMWqDZM/vm+Hm3UtPfRujyO6PzN

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e06a712c6d5ffc1925839bfa2829ee8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e06a712c6d5ffc1925839bfa2829ee8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\A3006253\sfx7.dll

    Filesize

    2.5MB

    MD5

    e7ab62c69da959301728305fbf38acf5

    SHA1

    4e9d623796b79f6b5e69fc9438f011a70f677e55

    SHA256

    da687366b506845ff6eae0b93a7105ba052418236633047272657921b31fba92

    SHA512

    c22c188eec0b6af21cf97ef4af20224cd2566280a55b1ec2cc448cb92e35bb4d358985ca02212959b4dfd453ce2adae2a104d58a40cfbfc1793fc2c080c2fc2d

  • \Users\Admin\AppData\Local\Temp\A3006253\zar.dll

    Filesize

    278KB

    MD5

    17bddadca7044cc7b8406f1ca45210df

    SHA1

    d74c5236542f4ddbb50cd113dedcd05aa9861ca9

    SHA256

    4406dc1789f1ebdbfebb7796719d21dcce2250f3a0a07f204cfd0b4f93725f6c

    SHA512

    1abf4e41912e18b77f7e0ea7ce98e0a5760a554cf79c78dd8ccaf04589fc02579b0fbb5a822acf2d098c2362b778821b1e5e870a55cba5834566a723c0716d50

  • \Users\Admin\AppData\Local\Temp\nst9F5C.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • memory/1740-16-0x00000000026C0000-0x0000000002956000-memory.dmp

    Filesize

    2.6MB

  • memory/1740-22-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1740-25-0x00000000033E0000-0x000000000342F000-memory.dmp

    Filesize

    316KB

  • memory/1740-101-0x00000000026C0000-0x0000000002956000-memory.dmp

    Filesize

    2.6MB