Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 15:38

General

  • Target

    78a6e33dc1501a53f687e56e94ad3575_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    78a6e33dc1501a53f687e56e94ad3575

  • SHA1

    cb0cc13e47ffc1a95822fd512db125f87f150ffa

  • SHA256

    56a6019b2a79ae45bac835fe186d0de8ac8d57e3283e8f31904544902766c024

  • SHA512

    882ad8a506d69913464b56097c0fc130f3368f06ede2897d57925452a542f11487f187f8e822e171faf78fa48f1f57458869e9f25e03ca4e0a890c253f57df67

  • SSDEEP

    24576:ZOkPDafAwBvBXEjbEh2GAZQ+/VKOEnuneIxGbw4iPKDHYfYVxwh/FtOTy0/ZpyIg:ZPDao8BUPE2ZvynuneIx0YKjksxwxF5x

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78a6e33dc1501a53f687e56e94ad3575_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\78a6e33dc1501a53f687e56e94ad3575_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\system32\msiexec.exe
      /i "C:\Users\Admin\AppData\Roaming\Luottokunta\EMVLumo\install\7475BF6\EMVLumoSetup_1.00.026.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\78a6e33dc1501a53f687e56e94ad3575_JaffaCakes118.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\"
      2⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2624
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 31A7A47686D9513862A8A74E8117E4AD C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabFF09.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\MSI23C.tmp

    Filesize

    48KB

    MD5

    061b504c1a3a41ecdd9cf7b1d33259e4

    SHA1

    2394bb353951e524a67249f14b0a6fd15ea65123

    SHA256

    02ca99212b699c7efb1f0c3a62d873911212777132366c894fd094fe226cb5bc

    SHA512

    0697c0732d71db35db7380fbe78a09d8d32f92cfd38ca8f98b079938122e96e9c859039015f334471c0fb5d8b8077e975b5c92fe3170b0a639a7f39d2cc61c63

  • C:\Users\Admin\AppData\Local\Temp\TarFF1C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Luottokunta\EMVLumo\install\7475BF6\EMVLumoSetup_1.00.026.msi

    Filesize

    748KB

    MD5

    ccf5163b906ca6cf062c3f91efbd9b5a

    SHA1

    93df2d050d024c55ba0d8d01c29a08b7ffc3d145

    SHA256

    5b7dce243a01afdf57e7e6e9199ba92721029cac9d8a2f7c014ff159ba27a7fc

    SHA512

    486a9ab2f1908860b04ed7864b4edce21fed97504529b6f2efcc9882da5642d3607516c12cb7fb25a46fb554482a766a302eb1425190790afe2487517509792e

  • \Users\Admin\AppData\Local\Temp\MSI2BA.tmp

    Filesize

    245KB

    MD5

    bd84e2d4c66a5139eb36b2c5799cc042

    SHA1

    13bc11c8efe52bba77fc72d6867646725635beab

    SHA256

    4a3c2bad890e08cdf6c51230b950ef689983bda0d698d748bbbee1589c1c18d0

    SHA512

    10795d40b60281724e3b853621671b07963738ee44065a1a98cf87e1c9ed535a6abf17ab2c050471407cce0fb4874e68d786813aaa1f35cae4ecdeddacbec122

  • \Users\Admin\AppData\Roaming\Luottokunta\EMVLumo\install\decoder.dll

    Filesize

    105KB

    MD5

    b2b2a36e61d81c8b06bbb3646c349b1e

    SHA1

    ce2e984706cf9253bf3503c9e132de456356c8cf

    SHA256

    1a47bd5f55c383572ea06c29e4776d8bc098c936d7dbfe505c2a2fad82971e3e

    SHA512

    f03aa71eb7a762d6384e992e184ed05a131857da25e53a08f7969bee2d206c3c34a55f92b1aa27d6f0af584a3bc8b5754fd5bee91f986635b421e523789e7d2a

  • memory/1904-0-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/1904-84-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB