Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 17:22

General

  • Target

    d4e1776072220e733ba26a74e6131a7b_JaffaCakes118.exe

  • Size

    13.4MB

  • MD5

    d4e1776072220e733ba26a74e6131a7b

  • SHA1

    7986a62aea77c432029a61d18b49d62949a11d30

  • SHA256

    94082c6d7e553aa8875fc199fc8cbeff5a27431e9087378fd3e4b3f565cc285a

  • SHA512

    908b20a9edf0d1918d2d5c73568d8e97dea156d9fb0cf0c5d95fd89b971304b6d37264b39ed6e057d8d28280d407e700f2161cf8b5b85dac73d32443dbf116fa

  • SSDEEP

    393216:FpAzXLKi/KForUnnXFwtAdPUqJyBTIm1GQv8:FpAfnlAnXFBdPU4yT1GQv8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4e1776072220e733ba26a74e6131a7b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d4e1776072220e733ba26a74e6131a7b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\InstallTools.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallTools.exe" "C:\Users\Admin\AppData\Local\Temp\d4e1776072220e733ba26a74e6131a7b_JaffaCakes118.exe" Software\ByteFence INSNDE "C:\Users\Admin\AppData\Local\Temp\d4e1776072220e733ba26a74e6131a7b_JaffaCakes118.exe" /mode=s /url=logs.bytefence.com/event /product=Bytefence
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1892
    • C:\Users\Admin\AppData\Local\Temp\bytefence-installer-5.5.0.7.exe
      "C:\Users\Admin\AppData\Local\Temp\bytefence-installer-5.5.0.7.exe" /LM=3 /INSTEX /cd=12345 /thankyou /IGNORE="C:\Users\Admin\AppData\Local\Temp\d4e1776072220e733ba26a74e6131a7b_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\InstallTools.exe

    Filesize

    274KB

    MD5

    7bfcafbcc8ee124ce3ea6b098105865a

    SHA1

    f404c9a50e0740e465106321012c3b7859c999dc

    SHA256

    d7ffd96c98cdcd1bacbe7542b403d60a8b700ab8305de02738f1f1c2d98aa71f

    SHA512

    02b873be813abc8a50b882bed60ad2c57ad6cba8f83984c30d2ca0b5dba6c5b6427d44626bd2689e179bff539160b78b3ff6b604d1d134a147e41c9861b1600c

  • \Users\Admin\AppData\Local\Temp\bytefence-installer-5.5.0.7.exe

    Filesize

    13.2MB

    MD5

    bd660f5e0f39dd05d5eefff4ce65c017

    SHA1

    956847325b76f4f02c8803f71204f4c747823ea2

    SHA256

    223ab46425284dd4ae73f8e7ad478eca6a0dcb4902cbc2f203b73b7cfe0da90b

    SHA512

    4fb02afb13c67c3d99cb0b183ca20ede069fb7a92cacd2f9bc73891e05a51bd6bd3ca2988fb71813444f9c9853ab8ad42193b234d5d0a60ca6a63355b51c0469

  • \Users\Admin\AppData\Local\Temp\nsyF039.tmp\System.dll

    Filesize

    11KB

    MD5

    fbe295e5a1acfbd0a6271898f885fe6a

    SHA1

    d6d205922e61635472efb13c2bb92c9ac6cb96da

    SHA256

    a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1

    SHA512

    2cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06

  • \Users\Admin\AppData\Local\Temp\nsyF039.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    ab101f38562c8545a641e95172c354b4

    SHA1

    ec47ac5449f6ee4b14f6dd7ddde841a3e723e567

    SHA256

    3cdf3e24c87666ed5c582b8b028c01ee6ac16d5a9b8d8d684ae67605376786ea

    SHA512

    72d4b6dc439f40b7d68b03353a748fc3ad7ed10b0401741c5030705d9b1adef856406075e9ce4f1a08e4345a16e1c759f636c38ad92a57ef369867a9533b7037