Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 20:15

General

  • Target

    b0ac8a187a88d616f43dcb2d31e6ccea_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    b0ac8a187a88d616f43dcb2d31e6ccea

  • SHA1

    d542b218ade2c4cc509048e9c0d3a741c24f8568

  • SHA256

    6b5a0e40bd7225e11e8fbc497c70a89c89f948aaaa984773a213a326ff1a7642

  • SHA512

    32dd4c2ec0ad13c8cd34a1734d4a3d4535d6a377103375c9f0a5851e71e1dac750c29bd538389bc027f086cb68bf3049d18ba85ccb1c9bb7cfdec91639646f72

  • SSDEEP

    24576:Rw3Iaix60wl0pNB+snrg0g3E655XKFmPH5JRDzJILWZy+90dj9xo7:Rl3ylaNB3g0dgWmvXRDlwJhjc7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0ac8a187a88d616f43dcb2d31e6ccea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b0ac8a187a88d616f43dcb2d31e6ccea_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:3156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_1F4D98073CB9D76D41243526F78362EC

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_1F4D98073CB9D76D41243526F78362EC

    Filesize

    416B

    MD5

    403b345a64ae4d64d8bbcbd9a2f64ae8

    SHA1

    1e2be607f993a70e2c0ac30b3139158400577ad7

    SHA256

    0514206b13f93e838f8ad45e3fa01553a972e5e1eeaf3a40f165e974b8adab93

    SHA512

    020915bc9e04db55ee5bbcf15546dce353ac0d0469247fa29728b0a3d322627f07ffc4dbe851a36c00a6f537160b054f351c36b8c1ed72ba2d9cf3c636258dec

  • C:\Users\Admin\AppData\Local\Temp\nsn8203.tmp\Install.dll

    Filesize

    236KB

    MD5

    95fc382abf1b2ce439b34e881654de0f

    SHA1

    41bda0cde6df5753a39873db02c7723d27e64046

    SHA256

    f53ce205133ac6cd4eca87a98127ff19d5f49b2443312af7704c33b3a5de278c

    SHA512

    c65b1eee9cfa4447384b25c9fc859a429076758d1dfe1b49a7e73b5b270f1f32a818f3e39dd53f69ec7b73b58c07a3ea88e686e2ec15cde21b1606b7bfee9aa2

  • C:\Users\Admin\AppData\Local\Temp\nsn8203.tmp\System.dll

    Filesize

    10KB

    MD5

    05e52213cfa17dee760186462a9645ed

    SHA1

    f6d5e82080bbba65db7d54e89250c95af833aae3

    SHA256

    d9d3ffa4c7d7a152f435f4777e72aa1b6a6c0555f277e59eedebc587c3b66ba5

    SHA512

    586eea0bec6345b437667ce528bc2396427dd444a396456e38046a8962e92a52e7ee62b9f6c97f41bc1fb4a1b3905a302d6f7055e26b84e60709ba3b416ad172