Analysis

  • max time kernel
    100s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 07:04

General

  • Target

    c03424595ab2bf4310e27fef69eb3254_JaffaCakes118.exe

  • Size

    676KB

  • MD5

    c03424595ab2bf4310e27fef69eb3254

  • SHA1

    ed6cfbcd58585d9a9d051f6a370eb691dcbc461d

  • SHA256

    1db22bf93ef1603462eb1bcc15d4b921520ecc72ab351cdedf0f996a5ad6ca07

  • SHA512

    f52cbc1c7cc4630479f63d45f75ee7b191f2f49279ee8188a16180e5c58ed5e15a2cb580805862b5ad171639d62130342bc7084ecc11ef3faabaee676e784dee

  • SSDEEP

    12288:TCS66ADniqwce2BRa5XNyPB0sUVHXe5RG2J6Vln9q6dHf:TCfPwce2cgPB0JVHXe5RsVln0m

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c03424595ab2bf4310e27fef69eb3254_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c03424595ab2bf4310e27fef69eb3254_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2320

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsj964.tmp\ioSpecial.ini

          Filesize

          643B

          MD5

          f6e2863fefbc7548f351827d5e72433c

          SHA1

          c64d4bd4caf2de2b880de0801d1ec05d225a5b4d

          SHA256

          02c2c5942294012756122a1151f95a31e5aa49958997568578598a73ed7af5cb

          SHA512

          2991db618d6ac847375d1bef73370144c451ebe88dd0f1000f2d45fd186c9dbd2421982acd6ac18354059ed540c9e0cd14a4b927cb2d521ecf5a927085154e19

        • \Users\Admin\AppData\Local\Temp\nsj964.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          eef9e469e8a30717974499f277d97e2a

          SHA1

          2d33c25984ebd9116beeb55cdde4c5c86c023e5d

          SHA256

          1f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078

          SHA512

          d860132106a1c03dfa23f983b3c503f1216ac02f3d47833b96dfb333fb30bc8ab4d4fecd1f1f0a89f0c7f3586405461e2d53c26f282bb48970e549659b364b48