Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2024, 19:16

General

  • Target

    c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    c77bf4a7d08b1f7bde533391cb008cb3

  • SHA1

    ee26a27ceec5c03b25f60f54b06ee4a405576b10

  • SHA256

    34bcaa75c7286a2e7af087ebf1f8bc557066f3df80a8eeecb9637786e62a30d7

  • SHA512

    4ccb0f49c8437fadb23a944cbafea59e6820d208c00a8b8b3571f3b89a04b6fbd091e06425b43e157e7335fcbb23cfe2ba9f72db3b85bcbab570a2c894278995

  • SSDEEP

    24576:02ZYb+kLNJlsJeRKZR/rs8KTFw1tqwR5lKWnens5bNn7adL:02yio7lX89cwPBR5lKWesBN7i

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 8 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\MSSCRIPT.OCX

    Filesize

    100KB

    MD5

    656524b4401f21e2929b78ef4c36db27

    SHA1

    d91ff837d6ced5f0442fd0812b6c1079fe417906

    SHA256

    d493f101ccd1d8804c0981f4fc630718b267d7155bdb575d6f619497956ea44e

    SHA512

    d28b17c924fb5f172944c055a85003575300305eddbbc4c89460777108c87154622b39515ee1f994d713d790fe5b74a69c835bd00d0affc5292fa0150617c34c

  • C:\Users\Admin\AppData\Local\Temp\QMDispatch.dll

    Filesize

    118KB

    MD5

    ec6be2d929694596d883476b8f63a606

    SHA1

    9f7b7b21415e59d67285806582aab559c55d9d6a

    SHA256

    50d88a903e8709dd10c03c3b989d66318c05c9a06e4825a63b5cc317cd3575ec

    SHA512

    a072194b30e80db1d1856c8550d0cc23c269f3b53e7eaf603274caf04f0be658ff2c25dbe13480a77547dd2d1e95bf41f64fd260ee961953729a5274500338da

  • C:\Users\Admin\AppData\Local\Temp\WinIo.dll

    Filesize

    172KB

    MD5

    97319b9509416a2570fd5e6bc3015229

    SHA1

    04d945e2b1c7f7bc3f56bf42f89e0ca59c4f768f

    SHA256

    cf4e19241b914cf36965bbfa2aa2d325bf3e7b0d13de93a94f1fec7fb71a908c

    SHA512

    7c0c74be0064b32712a3e08c46285619aa2607890f06bed4ffd39e6896f349a44235f76b521d063fe7a4fda6fd66446a09581bc4eeb3dda85e83a8bc1b9fb65e

  • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

    Filesize

    22KB

    MD5

    1b850c577115c99dcece5716890f663f

    SHA1

    45d833b9c7a68783398949e77af5fbd18d0123e6

    SHA256

    dabc2af4d94dd7b43c079feafbb80b28f9f78e8be29e8f61fd94093608ee9b49

    SHA512

    d4cb1748bdd0f6c19b3fd7013d0cf38fb21a6bec53421d45dd8b0929e6cb89f395a8b1e61b806fcf058461c322da6154008a966bb33d5682d832a71cd17293ec

  • C:\Users\Admin\AppData\Local\Temp\helper.dll

    Filesize

    20KB

    MD5

    87e96b9b1540adb0c01aa48947967666

    SHA1

    cf630e13f5ce321c54de09d6ed24792282b05aa3

    SHA256

    f02409b2e367afd0e585a2e1c6ac4d10790fab5292d8d1c2b866fe04fab28d4d

    SHA512

    0b0fd2d03eb7fb255e283b387b2dd08390ff1ce5f0d47ee5a698b809e73e1c4f484c6970817c64af00531ac938ea5f1970de2a2ccfca769f135adc011e96a3ce

  • memory/3300-61-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-67-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-33-0x0000000002B00000-0x0000000002B55000-memory.dmp

    Filesize

    340KB

  • memory/3300-19-0x0000000001100000-0x0000000001111000-memory.dmp

    Filesize

    68KB

  • memory/3300-52-0x0000000003260000-0x0000000003273000-memory.dmp

    Filesize

    76KB

  • memory/3300-57-0x0000000003260000-0x0000000003273000-memory.dmp

    Filesize

    76KB

  • memory/3300-58-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-0-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-64-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-34-0x0000000002B00000-0x0000000002B55000-memory.dmp

    Filesize

    340KB

  • memory/3300-70-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-73-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-76-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-79-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-82-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-85-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-88-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-91-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-94-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB

  • memory/3300-97-0x0000000000400000-0x000000000071E000-memory.dmp

    Filesize

    3.1MB