Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 17:32

General

  • Target

    d0152335b8a9b870e7186b4915d29dcd_JaffaCakes118.exe

  • Size

    363KB

  • MD5

    d0152335b8a9b870e7186b4915d29dcd

  • SHA1

    90d4b56aa9e245cf0f4ddbaf5d734447268e7f45

  • SHA256

    221ae4bf4c96eadd0853a377fe2747b83401264223f265d925167a687f7afbcf

  • SHA512

    c20e7503a04be5af15f5f24a3f900762ac8842469b2951ffede0c7167beca74e10644a66691d9a9a154092bfbe2eee1979ce08232caeff04379d8a5813c79a21

  • SSDEEP

    6144:IQqX9fNj4FfyhQU3jIDMppZ9VcbLie/AeNH9uzhRXp7eFTNQFF8kvlQxH:A9N0uQU3iKPe4EH9uFQTCmUQB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0152335b8a9b870e7186b4915d29dcd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d0152335b8a9b870e7186b4915d29dcd_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c wmic process call create "C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\DLG.exe -- d0152335b8a9b870e7186b4915d29dcd_JaffaCakes118.exe","C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic process call create "C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\DLG.exe -- d0152335b8a9b870e7186b4915d29dcd_JaffaCakes118.exe","C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1508
  • C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\DLG.exe
    C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\DLG.exe -- d0152335b8a9b870e7186b4915d29dcd_JaffaCakes118.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DLG\initWindow\noconnection.html

    Filesize

    2KB

    MD5

    c6d5838d332020f4443e0022bd80b311

    SHA1

    0fa529423919efb7c6355cd3f5343a89629b2354

    SHA256

    249d55e92d031733c2b8d3c837af7eb9b5f4c07105f724efaef37dc378ef9926

    SHA512

    9ac73d1e8a8006b4216a3d89ba575b3aa21d8ff04209eced41c48e10d1c7532c987769a6a7e9bc9801b773afdeb743727fc6e82cc9386fe8db47980f807f3f0d

  • C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\DLG.exe

    Filesize

    569KB

    MD5

    253abf4e2e0583598965dc06a69be452

    SHA1

    ef51bd181dc4dfc4fcf2047aab050bf18eaca438

    SHA256

    a29243b8d8d1f0deeef81703f29fa90c4b477ebb417b7e60cfb0cab78b878a0e

    SHA512

    d5e5b79e087f0d5c2d52a06928b40095f4cb406e861cbec070aeb5bb46ba8ece0478732f796172e2b0f673e83e098b6a3d342e55947267fbd1f39a58ff353ed9

  • C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\DcryptDll.dll

    Filesize

    14KB

    MD5

    904beebec2790ee2ca0c90fc448ac7e0

    SHA1

    40fabf1eb0a3b7168351c4514c5288216cb1566d

    SHA256

    f730d9385bf72eac5d579bcf1f7e4330f1d239ca1054d4ead48e9e363d9f4222

    SHA512

    8bdbbaaf73e396cf9fd9866b3e824b7e70c59a2bdefdb3236387e60d0e645d011265fe79fb193f6c0d6abe2e9c01260720c71cd8f068fcc4624760511c54efaa

  • C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • C:\Users\Admin\AppData\Local\Temp\nsw7E87.tmp\nsP7ZIP.dll

    Filesize

    95KB

    MD5

    63d1fdac90da45c39b752671bc298e2c

    SHA1

    62d31cc63912a945e345d3ecd7145b09a74c0ff6

    SHA256

    6a921cfd66e7ed299c4c97499c9441d57c5b5f1328fa7ef09a11e95d92036710

    SHA512

    b4be365fbfa43e3970b875ade297c2820d1867bff5e3d3d36f91cc25f41a5e5040ca4057e319830fb5808fc2f9f42a2b7fcef8007ac668e9cf62a98a38891b86

  • memory/1328-31-0x0000000001010000-0x0000000001011000-memory.dmp

    Filesize

    4KB

  • memory/1328-58-0x0000000001010000-0x0000000001011000-memory.dmp

    Filesize

    4KB