Analysis

  • max time kernel
    100s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-08-2024 07:11

General

  • Target

    8976806003b3910f5104e9824a6e0ca9_JaffaCakes118.exe

  • Size

    250KB

  • MD5

    8976806003b3910f5104e9824a6e0ca9

  • SHA1

    93602ec05e09e2aee0fb0e30e18bd85d7e6585c6

  • SHA256

    e6e572a7a97464a2425d42d270dbdb7400397a90e32eac590209f8e14c3a703b

  • SHA512

    858ab4e279ac2095de16909c1d56688aeb74f51a97470e03ab20b013540b1dbe59b26bc8c668131f1a267dac537363ac20df3619eb6d6d72515aaa787a8628bd

  • SSDEEP

    6144:ZzZZjhmPyUJErGJ2HeTr3FOFukQvDQWxkScs2GG4CSaGw1:ZzZRhmPb+i/E7GzxkScs2GG4baZ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8976806003b3910f5104e9824a6e0ca9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8976806003b3910f5104e9824a6e0ca9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nseA7C5.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

  • \Users\Admin\AppData\Local\Temp\nseA7C5.tmp\inetc.dll

    Filesize

    23KB

    MD5

    7760daf1b6a7f13f06b25b5a09137ca1

    SHA1

    cc5a98ea3aa582de5428c819731e1faeccfcf33a

    SHA256

    5233110ed8e95a4a1042f57d9b2dc72bc253e8cb5282437637a51e4e9fcb9079

    SHA512

    d038bea292ffa2f2f44c85305350645d504be5c45a9d1b30db6d9708bfac27e2ff1e41a76c844d9231d465f31d502a5313dfded6309326d6dfbe30e51a76fdb5

  • \Users\Admin\AppData\Local\Temp\nseA7C5.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f7b92b78f1a00a872c8a38f40afa7d65

    SHA1

    872522498f69ad49270190c74cf3af28862057f2

    SHA256

    2bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e

    SHA512

    3ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79

  • memory/2380-38-0x0000000000400000-0x00000000009F7000-memory.dmp

    Filesize

    6.0MB

  • memory/2380-39-0x0000000000400000-0x00000000009F7000-memory.dmp

    Filesize

    6.0MB