Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 18:01

General

  • Target

    46e8b747b9b01e85a56e92c4bb45ee0c_JaffaCakes118.exe

  • Size

    371KB

  • MD5

    46e8b747b9b01e85a56e92c4bb45ee0c

  • SHA1

    54e27ab133166c6b39cab2ee0aa720fd6b4ad149

  • SHA256

    2cb127d9fe410b16a83c525067d705aa2363b8db9881f4eff4f98e688c9c4778

  • SHA512

    691a5d6f62000e74ec5497364276b78bfef849f86125191116377ebe01047bb871b28dd0cc49307a166210c9e30430acaa2998ebe82d0ac7c27de5285e9845a3

  • SSDEEP

    6144:ReTeM/f+lshe/4u9qHO3YWP/9ZedHbrCf4ajE4u/PalqCJD+67RFAZ0u96:FMH+lsgfDTqS4v4u/neS67rAB6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46e8b747b9b01e85a56e92c4bb45ee0c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\46e8b747b9b01e85a56e92c4bb45ee0c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst78AA.tmp\ioSpecial.ini

    Filesize

    753B

    MD5

    3bff7099c3c1237c359a3ffb231148d9

    SHA1

    ef4e4f6720c9818d84508aea1e43be33574365e8

    SHA256

    715d2bb76fce153154bfa2c60ebaa877e2a9c04f84d45105bd48ea09957a4e5a

    SHA512

    e10cc324465396442d3e34cfbf5785fe3d95b9af5507d51b0c3370eb90ab8eabb4a08c797b4236ecd54a884eebe797a66149997e803cf2cd8f785aa81ca89d09

  • C:\Users\Admin\AppData\Local\Temp\nst78AA.tmp\ioSpecial.ini

    Filesize

    805B

    MD5

    1691678bf7ee5691feb3aa7402528d06

    SHA1

    54f3b1074a4184ef5589d14219ad79bab1388c57

    SHA256

    dda88307107fd153d53a0188bff964fdf3760f34998974ccf88d848e0029ea47

    SHA512

    42e243fbd4e3f25f125ed1d5c9f9d701112b5efee4105840fbbd231300d00f561c440611ec7a4e18cfada78e156e44965eb792aa45277a2ff6add21f61a6a26d

  • \Users\Admin\AppData\Local\Temp\nst78AA.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nst78AA.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    0dc0cc7a6d9db685bf05a7e5f3ea4781

    SHA1

    5d8b6268eeec9d8d904bc9d988a4b588b392213f

    SHA256

    8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

    SHA512

    814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0