Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2024 14:19

General

  • Target

    8f0e523e2b297a72d3873a0530a20724_JaffaCakes118.exe

  • Size

    2.7MB

  • MD5

    8f0e523e2b297a72d3873a0530a20724

  • SHA1

    6cb7614032892b7c14274603c8855883c8d69e49

  • SHA256

    6ad1835f4a03f110b2094ede277a362ccb36bef8613bffb0a07380e3a666f18c

  • SHA512

    3c26af3e07822ca694b973f481433365b4ccc238e80a332864998c7840aff0e4f1ae15a93d1e38ac0b37fed79104437968e1b8bdcc1c8cc260c73875b5f2309a

  • SSDEEP

    49152:G54CeMBvAryNfY/CflVu7LvV+RMXCkJU50hewj7v13P35HhwPKx:G54CeMBvAyNfY/KlU7TNJp5j9JHSix

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f0e523e2b297a72d3873a0530a20724_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8f0e523e2b297a72d3873a0530a20724_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso832C.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • C:\Users\Admin\AppData\Local\Temp\nso832C.tmp\ioSpecial.ini

    Filesize

    698B

    MD5

    889073c332b2660d56e7d9ad3b4b1600

    SHA1

    8c290fcbb835f44f8d128a3916ef32f333b31663

    SHA256

    e80987a0530374e01e1becca95aba866904bdd965911f8caeade53cb15dec2f7

    SHA512

    1d35b8e5d7c798e2bb23edb8980caacb653707e1794295a1b5c8e612bf6cbb607cbb0e4594a407e38c19888afb0feb67a6965a6c843c5307975219c3c6965911

  • C:\Users\Admin\AppData\Local\Temp\nso832C.tmp\ioSpecial.ini

    Filesize

    737B

    MD5

    0b874da25963ece5aafa8649c4a76cf3

    SHA1

    3bec603a93b1a8c04d13a9c089b95d9f6a7b13b5

    SHA256

    215aa557a01a4502d841a9871ff0780fe233208fa44be2fe8548c10e93025926

    SHA512

    436a93291b859c3df07d12d8c011b35c57f3ccad5110bb73f435d940ad14399f3203a8dac43b7281c0ddf4707f02025d95592f6052fb781f5b4f22d2ce6f10b9