Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 23:40

General

  • Target

    dd4069cb46beda157be20450bae4fba2_JaffaCakes118.exe

  • Size

    7.1MB

  • MD5

    dd4069cb46beda157be20450bae4fba2

  • SHA1

    07090334daa349b513b6584b05d42b205e2bae1a

  • SHA256

    2dd81749fd674fec98269ee6c40ab9d3247b788d8a5cb9640d7d5bd70cd77722

  • SHA512

    a559238daeca8cb94eb1c0784b1dbe7c81fd79b03ebf45205cfeb1bb563f6c0bbf44df57edef7dd989b6c40f982cb72a999e2287d5f93e8eaa8b741a4b9c698d

  • SSDEEP

    98304:aCXZGgMhv+5aR+uPCkQ4YCZL3zNc6a9Zpn6d/3VrDkk4EdKy3NixJ9pfhEhcyNoy:xAr254tQEOD3YdPlDkpA3yn3MrN1As

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd4069cb46beda157be20450bae4fba2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd4069cb46beda157be20450bae4fba2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\TempImg\Installer.exe
      C:\Users\Admin\AppData\Local\TempImg\Installer.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2548

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\TempImg\vcheck.exe

          Filesize

          24KB

          MD5

          02ce8877565b7020ad6dd0857afb4cd4

          SHA1

          684435c0c0511a6fd7532496780bbcd6dd39b0d5

          SHA256

          4321b89de48a199b076a5a9e27dcd4f9f82365ef340f42ac29ecd18510f1e43c

          SHA512

          c9ab0fa25aa692ce270063f47403a4c40056e5f400ae1e254af00cc5aa37dc02d7cb47f19bf263027b2ab18dff78cb6f5510155e4509c3d99e8733e6c124de8b

        • \Users\Admin\AppData\Local\TempImg\Installer.exe

          Filesize

          6.9MB

          MD5

          186b0136f303bbdfa28d4186073bea8a

          SHA1

          6cb4cf0098b71a486ff5deaf222b8ffafcde818a

          SHA256

          091088c5d1ee6da6b7584af2a7fd1315f5cd5b09789c3f375654f29b372bbdea

          SHA512

          b0f47bdba9914e1f114039b2a90e224a980fa5b83d7d1981a80592a84ea06760cac2a335e78b38323f71c4bb34e3590fe9b2123318e704a38d9bd083229688af

        • \Users\Admin\AppData\Local\Temp\nsjC7F2.tmp\ExecDos.dll

          Filesize

          5KB

          MD5

          a7cd6206240484c8436c66afb12bdfbf

          SHA1

          0bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919

          SHA256

          69ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926

          SHA512

          b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904

        • \Users\Admin\AppData\Local\Temp\nsjC7F2.tmp\System.dll

          Filesize

          11KB

          MD5

          c17103ae9072a06da581dec998343fc1

          SHA1

          b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

          SHA256

          dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

          SHA512

          d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f