Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 04:52

General

  • Target

    8910a8ae45e9bf08e0e5286daeb990e6_JaffaCakes118.exe

  • Size

    224KB

  • MD5

    8910a8ae45e9bf08e0e5286daeb990e6

  • SHA1

    38b37a8ddbb0f36ed7ecab1c16ddc539de20378e

  • SHA256

    f3f14e8e3c41994d93784d3dfe12b0d9150a1817dc031fb4dc88157e0b53d54e

  • SHA512

    c21b7249a8f2494f4595a22e0746160ff6ea1721d06359bea02090a1db7fd1613d46f021d787ece261f589c637c0678e38b182c6b54bb0e98a2f6447c4776967

  • SSDEEP

    6144:4zZZ9GROYFCTT+uCIK6DT6Dcs2GGxErGtCSaGwc:4zZzGHWTLRAcs2GGx+wbaw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8910a8ae45e9bf08e0e5286daeb990e6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8910a8ae45e9bf08e0e5286daeb990e6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsoACF3.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

  • \Users\Admin\AppData\Local\Temp\nsoACF3.tmp\inetc.dll

    Filesize

    23KB

    MD5

    7760daf1b6a7f13f06b25b5a09137ca1

    SHA1

    cc5a98ea3aa582de5428c819731e1faeccfcf33a

    SHA256

    5233110ed8e95a4a1042f57d9b2dc72bc253e8cb5282437637a51e4e9fcb9079

    SHA512

    d038bea292ffa2f2f44c85305350645d504be5c45a9d1b30db6d9708bfac27e2ff1e41a76c844d9231d465f31d502a5313dfded6309326d6dfbe30e51a76fdb5

  • \Users\Admin\AppData\Local\Temp\nsoACF3.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f7b92b78f1a00a872c8a38f40afa7d65

    SHA1

    872522498f69ad49270190c74cf3af28862057f2

    SHA256

    2bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e

    SHA512

    3ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79

  • memory/1460-43-0x0000000010004000-0x0000000010005000-memory.dmp

    Filesize

    4KB

  • memory/1460-42-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

    Filesize

    4KB

  • memory/1460-45-0x0000000010004000-0x0000000010005000-memory.dmp

    Filesize

    4KB