Analysis

  • max time kernel
    19s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 17:17

General

  • Target

    b01fe4c510886f35f2afe5c0b482b3c3_JaffaCakes118.exe

  • Size

    79KB

  • MD5

    b01fe4c510886f35f2afe5c0b482b3c3

  • SHA1

    289d87b487972ca9b7d769fa7b59c8e80e995a6b

  • SHA256

    2ef3773ad2860ba39f3d7e2f699b0b14f299c618e2852490c08e0daf25f748db

  • SHA512

    01be9ba49e5053bb5cf999aa945bda0f1ed02af9095ab35eb1dd005e3377b4738d4b1a16b8c71a931cd10d8897421e90747993009c09077955b68e21f5d39e20

  • SSDEEP

    1536:vpgpHzb9dZVX9fHMvG0D3XJogdLeAyNUFeKMMIeswxZiTKd1drj6CSWm+:RgXdZt9P6D3XJoceA9ejLeWuxj6JT+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b01fe4c510886f35f2afe5c0b482b3c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b01fe4c510886f35f2afe5c0b482b3c3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2492

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\nsoFB7F.tmp\KillProcDLL.dll

          Filesize

          44KB

          MD5

          3599d30554ad65dc29fc689217d2152e

          SHA1

          8f5fcc313b667a1de2d56573bcf98d43fd0d4ff9

          SHA256

          1af3ac7d3176af42e8594ba0c33821d3318f4eea5cbb799bf8fab58e480efe0e

          SHA512

          846776b1d908b5204667715ffdfd3a6c76dface1677e8b1e5156ceac2ef0a739f68b48ccbb919c9e08d6ff359a93174bf0b90def7d48cee54cd3c41d8d8575f2

        • \Users\Admin\AppData\Local\Temp\nsoFB7F.tmp\inetc.dll

          Filesize

          21KB

          MD5

          d90021fa6e58e4006f0bc892238e894e

          SHA1

          5377e83ac32e0e13190a26f0020a5fa50ea78c8c

          SHA256

          e20683095e7e8580955e11632293d52d609e802b899099d3ee246d1a4828f2b1

          SHA512

          696a442e62cfeee863f50bffc9c8c890458fdac92f6d92f465f895cd4d0fa58607db4dacf518251b83824c3d795482d47d76c877b84f1af3129bbf9526e9f347

        • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

          Filesize

          79KB

          MD5

          b01fe4c510886f35f2afe5c0b482b3c3

          SHA1

          289d87b487972ca9b7d769fa7b59c8e80e995a6b

          SHA256

          2ef3773ad2860ba39f3d7e2f699b0b14f299c618e2852490c08e0daf25f748db

          SHA512

          01be9ba49e5053bb5cf999aa945bda0f1ed02af9095ab35eb1dd005e3377b4738d4b1a16b8c71a931cd10d8897421e90747993009c09077955b68e21f5d39e20