Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 03:21

General

  • Target

    72681dee02c82f7ced1f6fdb57cff1b1_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    72681dee02c82f7ced1f6fdb57cff1b1

  • SHA1

    f3aeaf7b7d8ad83556c4e435009d97f67941c37c

  • SHA256

    aab91f3b6eef001d4bf9feb995741aac5d4f96b3f9d8e5bec453b0a1394a13dc

  • SHA512

    c00d4570dd45cad4ffcc57bceca19c257423dacbfe6e03f4bcf3a36fa8f3aef180e65be1c14704f84a3ad13e9c2f71a00ab2b2d54c8ac3c50a7c1e6468d000df

  • SSDEEP

    24576:PJ7KfoVYwDFx8ATUHrQyzi7cpSCIOX0vtnIRVlnPs9mbgwAKAT:PJvKgLTULQT7RG/RVVPsCgt

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\72681dee02c82f7ced1f6fdb57cff1b1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\72681dee02c82f7ced1f6fdb57cff1b1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsyB45D.tmp\ChkClient.dll

    Filesize

    140KB

    MD5

    3fe47e461bb686693cf440c8815f2a0b

    SHA1

    9a7d27d47a542b83d00f1e6027ba4c22d496f887

    SHA256

    5bdefe9a081e5e2f4af73891db6228a6b57e7dd320fac0ae233f5cd741db8a1f

    SHA512

    687c57e17c4f527b90e8eafa9929fa9ee0a1fa82b2c9ba9c6a6385cfcb1fcdd1e09305acbf357cf61e7dd7e061d581a378d2661ed7df7dbfd554514f04646e61

  • C:\Users\Admin\AppData\Local\Temp\nsyB45D.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    eef9e469e8a30717974499f277d97e2a

    SHA1

    2d33c25984ebd9116beeb55cdde4c5c86c023e5d

    SHA256

    1f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078

    SHA512

    d860132106a1c03dfa23f983b3c503f1216ac02f3d47833b96dfb333fb30bc8ab4d4fecd1f1f0a89f0c7f3586405461e2d53c26f282bb48970e549659b364b48

  • C:\Users\Admin\AppData\Local\Temp\nsyB45D.tmp\IsVista.dll

    Filesize

    44KB

    MD5

    344d13fd0fdd2d97e8d61960f40a8a30

    SHA1

    3f0f120203005eea3e8ed1652a6ea8a607ea934d

    SHA256

    17bb3331e2300aa01666fbee98b9552cec5e46212a4c5a340c0370b93df88f83

    SHA512

    b4e49c58503532e270cc369f1cbd14d85edd46da5ab034dad730bd4297887dd541d445d2fbf205820e6afbbdba7ab6d5b78b694467554320fd6db8e06fe4f719

  • C:\Users\Admin\AppData\Local\Temp\nsyB45D.tmp\Ischeck.dll

    Filesize

    120KB

    MD5

    6c1f65ce96712e05f64c7a26b7adee36

    SHA1

    6cea6c2618fb31902c52cb1d5fad04503bd34ed0

    SHA256

    544f3c2c03f7900539d4868437f8e08204c0b4c79357af666a1fb48d406c1ffd

    SHA512

    5244d26d013dc2c7083bd4c167cac99307985babcabc1806a898a2621fce6b73d256b21d549bce8744f3221a51017ea5f621d2f6f5cd5aae83ec21ae41e5d5a6

  • C:\Users\Admin\AppData\Local\Temp\nsyB45D.tmp\ioSpecial.ini

    Filesize

    660B

    MD5

    c578ac5ad39bf7e66c7b90818c330d1a

    SHA1

    7a3658f6f93d571418474b8978362a923da2ff71

    SHA256

    39fac562a83d5f73b28f45fd1149264fe8b9326a1396e0756098dd872add774b

    SHA512

    f2739872b9cf0554568262cd8d609a34f7d3e818df6751e3284002598854949d93ed0d9f77475cbdd92ba64d233cea7c269a87fcc3ed1d977dbc14c9664effb0

  • C:\Users\Admin\AppData\Local\Temp\nsyB45D.tmp\stack.dll

    Filesize

    10KB

    MD5

    0f61a81a543822de5fcb9a8a43f230dd

    SHA1

    d01d4a0f542f3c654637fdfe5a574fe1f150ece1

    SHA256

    46b4a72ae8590b0afb3304cc5c13db0502bc4c4cb02f64f37c79008c17db814f

    SHA512

    596b7a897ba64c32e26ba6168aa3628aad37b187a9814a286298307d8c42eabf8e8a679dbda558f8b2cdc8676c94ec819256432aa5ad7c05a5387759262a4402

  • memory/452-10-0x00000000024B0000-0x00000000024D7000-memory.dmp

    Filesize

    156KB

  • memory/452-19-0x00000000024B0000-0x00000000024BC000-memory.dmp

    Filesize

    48KB

  • memory/452-27-0x00000000024B0000-0x00000000024D2000-memory.dmp

    Filesize

    136KB