Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 01:02

General

  • Target

    5e6db209f2c32fc598d715bc053df5bd_JaffaCakes118.exe

  • Size

    6.5MB

  • MD5

    5e6db209f2c32fc598d715bc053df5bd

  • SHA1

    1b26b82b742b4e632ab8a4f0e90fcde8db13a225

  • SHA256

    52772a557b4d66472079a57066ea3956e0fb83cec5839151f6294f113c4b86aa

  • SHA512

    b897b3d580d9e16aedcfe421836c707253c1ab9411965117d3f60f070979f6e9b25c5f564d51eeef5075e3cd911cad56c7218794a4c572a6c91562b61b748ab1

  • SSDEEP

    196608:y4j6tflr8lDnB8erJVQkk5BHl4qwhip9TI1623Qh8Gm:y1bQ8erJ6k8BHl4qBvW5xGm

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e6db209f2c32fc598d715bc053df5bd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5e6db209f2c32fc598d715bc053df5bd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:3296

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\lki686E.tmp

          Filesize

          172KB

          MD5

          685f1cbd4af30a1d0c25f252d399a666

          SHA1

          6a1b978f5e6150b88c8634146f1406ed97d2f134

          SHA256

          0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

          SHA512

          6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

        • C:\Users\Admin\AppData\Local\Temp\nsy69B9.tmp\BrandingURL.dll

          Filesize

          4KB

          MD5

          71c46b663baa92ad941388d082af97e7

          SHA1

          5a9fcce065366a526d75cc5ded9aade7cadd6421

          SHA256

          bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

          SHA512

          5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

        • C:\Users\Admin\AppData\Local\Temp\nsy69B9.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          325b008aec81e5aaa57096f05d4212b5

          SHA1

          27a2d89747a20305b6518438eff5b9f57f7df5c3

          SHA256

          c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

          SHA512

          18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

        • C:\Users\Admin\AppData\Local\Temp\nsy69B9.tmp\ioSpecial.ini

          Filesize

          599B

          MD5

          9210f6c717fc1ee019620b33d0ba3183

          SHA1

          8824fc13f5e903bdd6b29c5fa981f5b5620b6b11

          SHA256

          cb03c77d072997696688e16e3be9eb3cd7e3aa9a88473337da97c1534d535739

          SHA512

          e99e0a008f034899b23018f4c6dc53732312bf8b5ef6d13d8e00e9a683653caa0468b34abd32ca06e32d62012473e168406230edf1187ea7a64d0ddfd888e388

        • memory/3296-0-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB

        • memory/3296-7-0x00000000021D0000-0x0000000002243000-memory.dmp

          Filesize

          460KB

        • memory/3296-8-0x00000000021D0000-0x0000000002243000-memory.dmp

          Filesize

          460KB

        • memory/3296-99-0x00000000021D0000-0x0000000002243000-memory.dmp

          Filesize

          460KB

        • memory/3296-101-0x0000000000400000-0x000000000043A000-memory.dmp

          Filesize

          232KB