Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 18:37

General

  • Target

    d4f7b55e9605124fa019d30f492b95c9_JaffaCakes118.exe

  • Size

    2.1MB

  • MD5

    d4f7b55e9605124fa019d30f492b95c9

  • SHA1

    d973aebd3450a64933a9876bb649e37485bc12d3

  • SHA256

    7d2f78a56f7d1a267d693d96f31acc9cc6ffd7dd7c6e6f873bf2520f2339f574

  • SHA512

    342adfdb5df85c4c9f3de8af98825d36adfda41f4c5a85baf6230eb95441e8cd5083f0a5caf5254f331da7ba0745345184311a9fb71e16db648b4c09b46a7602

  • SSDEEP

    49152:LIWxTdDQkIZXPve4D1JPZIJowmTVh99PaaiLGJfG:+ZfW4pjIJgTVhBiCG

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 15 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4f7b55e9605124fa019d30f492b95c9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d4f7b55e9605124fa019d30f492b95c9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 952
      2⤵
      • Program crash
      PID:2092
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 964
      2⤵
      • Program crash
      PID:2472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 952
      2⤵
      • Program crash
      PID:1368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1016
      2⤵
      • Program crash
      PID:2772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1100
      2⤵
      • Program crash
      PID:4756
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1188
      2⤵
      • Program crash
      PID:1700
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1224
      2⤵
      • Program crash
      PID:3228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1964
      2⤵
      • Program crash
      PID:1652
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 2016
      2⤵
      • Program crash
      PID:3020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1964
      2⤵
      • Program crash
      PID:4064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 2020
      2⤵
      • Program crash
      PID:3484
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 2108
      2⤵
      • Program crash
      PID:60
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 2200
      2⤵
      • Program crash
      PID:3132
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 2224
      2⤵
      • Program crash
      PID:2468
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 956
      2⤵
      • Program crash
      PID:2644
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 852 -ip 852
    1⤵
      PID:3508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 852 -ip 852
      1⤵
        PID:4860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 852 -ip 852
        1⤵
          PID:2720
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 852 -ip 852
          1⤵
            PID:4040
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 852 -ip 852
            1⤵
              PID:3564
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 852 -ip 852
              1⤵
                PID:1672
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 852 -ip 852
                1⤵
                  PID:4904
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 852 -ip 852
                  1⤵
                    PID:3744
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 852 -ip 852
                    1⤵
                      PID:4456
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 852 -ip 852
                      1⤵
                        PID:3720
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 852 -ip 852
                        1⤵
                          PID:2552
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 852 -ip 852
                          1⤵
                            PID:1956
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 852 -ip 852
                            1⤵
                              PID:4148
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 852 -ip 852
                              1⤵
                                PID:216
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 852 -ip 852
                                1⤵
                                  PID:1716

                                Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\{E258C325-A1F0-4A9E-8696-336708036080}.dll

                                        Filesize

                                        120KB

                                        MD5

                                        c9f333d1ff898672a34805f94a265329

                                        SHA1

                                        2deaac66698fb2e9b3868d23034c3211c508b739

                                        SHA256

                                        07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b

                                        SHA512

                                        048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

                                      • C:\Users\Admin\AppData\Local\Temp\~zm_{1EAC2EC8-87EA-4E08-B148-26CEF5438A97}\css\style.css

                                        Filesize

                                        2KB

                                        MD5

                                        bf7569fd66b7a398330ab7c1c31965a4

                                        SHA1

                                        efebe9b76fa49deda68efebfaed68f8b4880051f

                                        SHA256

                                        e34727af72f99606ffba57b2cacbcfb101e17fac2f86462d4bde8ff66024eba7

                                        SHA512

                                        2266db6fbbe0ae92c87332e13157114c5f2a72265b74e333bed6ae884346bdb1194b40c0fa127c05ad9287a2b5b80e864ab809b72f971abe02eb510ed2715f47

                                      • C:\Users\Admin\AppData\Local\Temp\~zm_{1EAC2EC8-87EA-4E08-B148-26CEF5438A97}\images\bg_bottom.jpg

                                        Filesize

                                        351B

                                        MD5

                                        f76e35ee80fcd4052ec4e4106a13f2d7

                                        SHA1

                                        1ccb169d78851733e3a384828c06021e1fdd279a

                                        SHA256

                                        a386a4e102b734e6085daa926d3a3950fcbe3c1631018d693095c17e86952a30

                                        SHA512

                                        ce6fc685581e784d1adcd8168c245bfcfe5868657be94c45459c533e318393123245d3a1eac9f6926bc0006dc520848ba6ce00e6a08889e3dd502c706fb1cb3c

                                      • C:\Users\Admin\AppData\Local\Temp\~zm_{1EAC2EC8-87EA-4E08-B148-26CEF5438A97}\images\btn_install.jpg

                                        Filesize

                                        3KB

                                        MD5

                                        de97d4ffab1f89b692e05ae961aa2535

                                        SHA1

                                        7d44832261c41732db3522633c29a3abe9e0f662

                                        SHA256

                                        2eb33619ce06d76dd65e5b0196825ae11e089745af9549455cbe0a0c0356b117

                                        SHA512

                                        8f62c62d779bfd8184e21ca4ac533f6619d19c478333e6172015a7413df4743129ee17fad56390ce2e9dd1bdb1f41dd1af181cd43f8ad28e87abb0e8f76395dc

                                      • C:\Users\Admin\AppData\Local\Temp\~zm_{1EAC2EC8-87EA-4E08-B148-26CEF5438A97}\images\btn_quit.jpg

                                        Filesize

                                        2KB

                                        MD5

                                        a47dc0b965f9c5a12645a7cdce093963

                                        SHA1

                                        05efd59dcfd9bb580a2c2a10ffb83a1c7c0f0cbc

                                        SHA256

                                        f62f2bc6e542ec755f182d257c80d3b14d5c968ae52a2062239daf80445d3b42

                                        SHA512

                                        66867c0c94c2d651eace3fdbb498a86f68163502d70a0bb72ba3554de48818e60634471f6778e35dfbf7a5563d89b02eeeb93731557ee82949324da3df266d60

                                      • C:\Users\Admin\AppData\Local\Temp\~zm_{1EAC2EC8-87EA-4E08-B148-26CEF5438A97}\images\index.jpg

                                        Filesize

                                        19KB

                                        MD5

                                        53a64792cf0cf4184e6f925888a3fe4b

                                        SHA1

                                        3a242b9abf7c5d7722d0db3f864d1e58089577e3

                                        SHA256

                                        786d13444e1f52f3263ff9ace9e28b1dd4e5b897ab153f9bfec13050f87389fd

                                        SHA512

                                        e0d1fa6d50d4da2d780948e08eae474de9ae72ed54fb2554d0b6e50152f92be822fa500972ac56091631b445caa542ff927de36ef23edc203597e18dfe9ff3bb

                                      • C:\Users\Admin\AppData\Local\Temp\~zm_{1EAC2EC8-87EA-4E08-B148-26CEF5438A97}\images\text1.jpg

                                        Filesize

                                        12KB

                                        MD5

                                        9a58c8baf22f4a76e6b119100a6e51f2

                                        SHA1

                                        1f86835339b552a3b6e67a15b2cfb9ab75037364

                                        SHA256

                                        b37196ce78804826cec7c75b398a9f434979cf3426c12de26c3210d4b89173e1

                                        SHA512

                                        6348e4bab6a92ad928253772171871592ca458bcb3d65beb82f64e8fbbf07d4e7d7a0fb1c86097dc182303a8055e17f3745d162536becd0c55cbf56363122bd2

                                      • C:\Users\Admin\AppData\Local\Temp\~zm_{1EAC2EC8-87EA-4E08-B148-26CEF5438A97}\images\text2.jpg

                                        Filesize

                                        4KB

                                        MD5

                                        1965a6e2723f1370a3291a758d22701d

                                        SHA1

                                        59149b9630986114f82937cb92c3298cc52fe024

                                        SHA256

                                        9c33cc36d582d12421298180b6acf3856ee59485d4567c2fbd4c77bebec564d2

                                        SHA512

                                        f38decc62a42c6e53e05b95d8d82511ab82a802a7f93cd8a4b5f6dde28f8e310844276ff142e4096aaad4e7228b769cb90b988d30167b76cef5cc0e94650b067

                                      • C:\Users\Admin\AppData\Local\Temp\~zm_{1EAC2EC8-87EA-4E08-B148-26CEF5438A97}\page.html

                                        Filesize

                                        1KB

                                        MD5

                                        f4742470b3b88a5db15e9d70d9115c66

                                        SHA1

                                        a42ad7f088b7bee3d3a16529166bf4704991032b

                                        SHA256

                                        2a45de3d7f2842f07b4328b10a5a659aa17760c6748621f13183dddf49483cc6

                                        SHA512

                                        52c952a82a033c4f082361444d4d90534e2d3c2a87c1afc71cf13eddfaa4322ee1dfdf18dfbe8939a0787cf98df86ed295d0696a338f82d957768d43e62e7aff

                                      • memory/852-3-0x0000000000400000-0x000000000062B000-memory.dmp

                                        Filesize

                                        2.2MB

                                      • memory/852-2-0x0000000000400000-0x000000000062B000-memory.dmp

                                        Filesize

                                        2.2MB

                                      • memory/852-1-0x0000000000400000-0x000000000062B000-memory.dmp

                                        Filesize

                                        2.2MB

                                      • memory/852-22-0x00000000056C0000-0x000000000571B000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/852-12-0x00000000056C0000-0x000000000571B000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/852-0-0x00000000004C1000-0x00000000004C2000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/852-88-0x0000000000400000-0x000000000062B000-memory.dmp

                                        Filesize

                                        2.2MB

                                      • memory/852-89-0x00000000004C1000-0x00000000004C2000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/852-90-0x0000000000400000-0x000000000062B000-memory.dmp

                                        Filesize

                                        2.2MB

                                      • memory/852-92-0x00000000056C0000-0x000000000571B000-memory.dmp

                                        Filesize

                                        364KB