Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 03:46

General

  • Target

    5a57f3de8dcc2111ed4da33f5710dc68_JaffaCakes118.exe

  • Size

    46KB

  • MD5

    5a57f3de8dcc2111ed4da33f5710dc68

  • SHA1

    7f3fad32319256ae8e6d136f72812b4715bff74c

  • SHA256

    bd3568da78a4cef5a10552720cadb41d5c5851521bbae694afeb6303feed531d

  • SHA512

    402c9eb9ad2502c2eba227f80e5e9c558c3accf5ebb9eb271c5474f6a435d623adc5518386408df4032484ad58a762db1c329322259996cbd49f22f5f09b3cf2

  • SSDEEP

    768:SSup23EQCjlQRB8/ewZ1iU6nyYFxbssT/F/O71mJ5TJRn0i9ZTeXNIdawwwcRfk/:Hu4EQalMK/ewGnh0mJ66ZqXedpwwtMPG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a57f3de8dcc2111ed4da33f5710dc68_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a57f3de8dcc2111ed4da33f5710dc68_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nse1587.tmp\validate.ini

          Filesize

          457B

          MD5

          513793e0c5cb43747224f7429d40fa3a

          SHA1

          cb736438830507461dbedd2a8c8d14f9ba0e1c19

          SHA256

          4e543b159fe25eb01133bbd73cec086d895fcbb0c3c8627ecfee2cd50207d404

          SHA512

          d8d2f46781b2788f4d3587edff8445208fe4894c5d82fc8a9d5102743fa7fe28ebc560f8b9c5a1d786ba638cc44a22fb8d3a12fdd688ed8d912db0f5c67e9017

        • \Users\Admin\AppData\Local\Temp\nse1587.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          06bef96b91bfa75b7f7817341a6cd597

          SHA1

          48a40368fc339ccea1dfda06d2e02bca7d7265c1

          SHA256

          2ca5590c85cc31285b83bbe569755d909d91b559db2d6ce3bca2fcc075225364

          SHA512

          5364d0944b4be215fb5d8bb8398e965ff6fa3190a962dd6c491984482321756017f89c2242d77ebcce6666c31fe54a956f2eb3a03a95d64121a1db462ad20a0d

        • \Users\Admin\AppData\Local\Temp\nse1587.tmp\System.dll

          Filesize

          10KB

          MD5

          7e3c808299aa2c405dffa864471ddb7f

          SHA1

          b5de7804dd35ed7afd0c3b59d866f1a0749495e0

          SHA256

          91c47a9a54a3a8c359e89a8b4e133e6b7296586748ed3e8f4fe566abd6c81ddd

          SHA512

          599f61d5270227a68e5c4b8db41b5aa7bc17a4bbe91dd7336b410516fa6107f4f5bf0bbb3f6cc4b2e15b16bf9495fdc70832bab6262046cb136ad18f0c9b3738

        • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

          Filesize

          46KB

          MD5

          5a57f3de8dcc2111ed4da33f5710dc68

          SHA1

          7f3fad32319256ae8e6d136f72812b4715bff74c

          SHA256

          bd3568da78a4cef5a10552720cadb41d5c5851521bbae694afeb6303feed531d

          SHA512

          402c9eb9ad2502c2eba227f80e5e9c558c3accf5ebb9eb271c5474f6a435d623adc5518386408df4032484ad58a762db1c329322259996cbd49f22f5f09b3cf2