Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 20:56 UTC

General

  • Target

    bd1fed5b5581cb9f3e8aea83d0279411_JaffaCakes118.exe

  • Size

    790KB

  • MD5

    bd1fed5b5581cb9f3e8aea83d0279411

  • SHA1

    0dacfb2383c75ebae8f19047f350e992a1918b57

  • SHA256

    40649dd149d4111d826d35a21f4709b3804c697c60794e02c493e39b78041396

  • SHA512

    2cfea08be156c62ff0261b4fd748fd5e38bb18b35c45c2fd75cb2ed8d3f5800a7247ae0f2782ec3e1f0dbdd16698904b6cb4e43f0ac33d4ee83aa7e12b9295f1

  • SSDEEP

    12288:N/TdyaCA+hdVa155LS7k3hyYnyUOlBaYZxpI2+dA1q0MM6PmKeOK2t:NLdBTKQ13oZTp9+dgqrSKeOt

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd1fed5b5581cb9f3e8aea83d0279411_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd1fed5b5581cb9f3e8aea83d0279411_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1472

Network

  • flag-us
    DNS
    service.downloadadmin.com
    bd1fed5b5581cb9f3e8aea83d0279411_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    service.downloadadmin.com
    IN A
    Response
    service.downloadadmin.com
    IN A
    23.23.235.104
    service.downloadadmin.com
    IN A
    18.233.221.25
  • flag-us
    GET
    http://service.downloadadmin.com/install?s=Affiliates&c=bgamerbugtest&brand=gamerbug.com&pid=TR&aid=1025&bc=356&country=us
    bd1fed5b5581cb9f3e8aea83d0279411_JaffaCakes118.exe
    Remote address:
    23.23.235.104:80
    Request
    GET /install?s=Affiliates&c=bgamerbugtest&brand=gamerbug.com&pid=TR&aid=1025&bc=356&country=us HTTP/1.1
    connection: close, TE
    user-agent: Tightrope Bundle Manager(ref=[6438a9ae618b188058e3a0a17fa35d451125fa19 refs/heads/master])
    x-webinstallcode: s=Affiliates&c=bgamerbugtest&brand=gamerbug.com&pid=TR&aid=1025&bc=356&country=us
    te: trailers
    host: service.downloadadmin.com
    Response
    HTTP/1.1 404 Not Found
    Server: Apache-Coyote/1.1
    Content-Type: text/html;charset=utf-8
    Content-Length: 976
    Date: Fri, 23 Aug 2024 20:57:02 GMT
    Connection: close
  • 23.23.235.104:80
    http://service.downloadadmin.com/install?s=Affiliates&c=bgamerbugtest&brand=gamerbug.com&pid=TR&aid=1025&bc=356&country=us
    http
    bd1fed5b5581cb9f3e8aea83d0279411_JaffaCakes118.exe
    652 B
    1.4kB
    6
    5

    HTTP Request

    GET http://service.downloadadmin.com/install?s=Affiliates&c=bgamerbugtest&brand=gamerbug.com&pid=TR&aid=1025&bc=356&country=us

    HTTP Response

    404
  • 8.8.8.8:53
    service.downloadadmin.com
    dns
    bd1fed5b5581cb9f3e8aea83d0279411_JaffaCakes118.exe
    71 B
    103 B
    1
    1

    DNS Request

    service.downloadadmin.com

    DNS Response

    23.23.235.104
    18.233.221.25

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso872C.tmp\LuaBridge.dll

    Filesize

    12KB

    MD5

    9781b7bb06ea11ebce5dc9d57b3437a3

    SHA1

    604123977fffadebfefccae08df6b8e2e5dbab82

    SHA256

    c26d867114a04c677ef9ac35d83c2d362c1fb9ff8d46abfb785d71a48cb9c309

    SHA512

    666125abfb144665506e1085793656f31708211b940efca8188a5b20d57a058dcae10ec274a7614450f7b66854c9239c2838e61b3721c10482710a2008b681d7

  • \Users\Admin\AppData\Local\Temp\nso872C.tmp\LuaSocket\mime\core.dll

    Filesize

    52KB

    MD5

    4a4845ba1666907f708c9c10a31ec227

    SHA1

    1ebf626adc84147e5114885ce779f92d6eb68f3a

    SHA256

    a1ffee9687ab4a23a78b3251888aff09e2896d76f8d16d713367b265f125188d

    SHA512

    d009f5e2a2ecfbec5e5e788ade142d612846d0c99921774e4a11b060998dfb0680cf1e1a54604535d5560738093f9ae166866cb23eee5c7d9c4e5cc5a33e7464

  • \Users\Admin\AppData\Local\Temp\nso872C.tmp\LuaSocket\socket\core.dll

    Filesize

    80KB

    MD5

    4bf7db111acfa7c28ad36606107b3322

    SHA1

    6f20b9f6663ce0c309a2ce60e718d64ffb6c75b3

    SHA256

    bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0

    SHA512

    0a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6

  • \Users\Admin\AppData\Local\Temp\nso872C.tmp\LuaXml_lib.dll

    Filesize

    11KB

    MD5

    7292b642bd958aeb7fd7cfd19e45b068

    SHA1

    19a800620d041634abae5b5d096cb0e87ce4c188

    SHA256

    90f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09

    SHA512

    bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a

  • \Users\Admin\AppData\Local\Temp\nso872C.tmp\lua51.dll

    Filesize

    116KB

    MD5

    bbc9ac3211f07e45510861ae429996c3

    SHA1

    0a0d7ea99c959cd4add3deb05e500af5fdf98510

    SHA256

    2a4f510a75453fb49ceb2823756bdbcbfe1a026dcd27a76260229386776ddaad

    SHA512

    f3a4a726ffd7869d277e9ee09a833cc27e10f117c52dd2a2efcc96cf9280730f10dcb704ea78a6d6f16ac2d2db1b94ad6025dfabaf83fdaaca4f5fbb0db1e756

  • \Users\Admin\AppData\Local\Temp\nso872C.tmp\luacom.dll

    Filesize

    287KB

    MD5

    ed7f7857933b38e5d10daf828e79af19

    SHA1

    7f1445f87f7e2256efc33ef56da20c3b23a1e0f9

    SHA256

    9dd5218bc2d12f4d07e268bc6ec01d6eefde4b99a07246d0a96d18477d331b5b

    SHA512

    ceaf9597d4cb725c4ec8b7af8d1090b38df102b52ca7606a24e9a094fc81f450f93ad22770c905db9115e271fa5fa4f5731caa7b1875e204edb10fb691741715

  • memory/1472-0-0x0000000000400000-0x000000000082B000-memory.dmp

    Filesize

    4.2MB

  • memory/1472-52-0x00000000003F0000-0x00000000003FE000-memory.dmp

    Filesize

    56KB

  • memory/1472-40-0x0000000000910000-0x0000000000926000-memory.dmp

    Filesize

    88KB

  • memory/1472-62-0x00000000025E0000-0x000000000262E000-memory.dmp

    Filesize

    312KB

  • memory/1472-208-0x0000000000400000-0x000000000082B000-memory.dmp

    Filesize

    4.2MB

  • memory/1472-207-0x00000000003C0000-0x00000000003C9000-memory.dmp

    Filesize

    36KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.