Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 18:29

General

  • Target

    dccf1c0ed1d79cdf5027d267bc903388_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    dccf1c0ed1d79cdf5027d267bc903388

  • SHA1

    06ad34deb5955200e02c74b3aa125c994c51a5cc

  • SHA256

    574cde264f64a788c58bedc94a3d1202f769e7dae9f0212b83e830c8fa3836e3

  • SHA512

    d8e0c28a9063d623f6e4545b7944ce70dc89a394c6d15d6a1184886c9eca012917bffd64942eb10539932c553567af8cf12ef8911f609e8458963e870788d832

  • SSDEEP

    49152:QS7s8yBakBWZregyorXdVV7TjRPvUPlaKuAR9h:H7s8stMy7orXdv7P9vWwMzh

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dccf1c0ed1d79cdf5027d267bc903388_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dccf1c0ed1d79cdf5027d267bc903388_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy761.tmp\ioSpecial.ini

    Filesize

    659B

    MD5

    cda908d7197fef4b7bd4811f69f28fce

    SHA1

    0083e79e7da306b10e63034db1f7f7a1468b179c

    SHA256

    1dcfde341a5c7421e6f181ab73b87869ca17ab6f316399bb0eb59a47308d3034

    SHA512

    e671bc28511e0259f3ffd46282bce59d79ca71b6882c43fe98aafe058cb717fd6defa5e3d5d3d41bdf02c5bf852561494307326dcb3f819e14cee404f6cd8ee6

  • \Users\Admin\AppData\Local\Temp\nsisos.dll

    Filesize

    5KB

    MD5

    69806691d649ef1c8703fd9e29231d44

    SHA1

    e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    SHA256

    ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    SHA512

    5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

  • \Users\Admin\AppData\Local\Temp\nsy761.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    eef9e469e8a30717974499f277d97e2a

    SHA1

    2d33c25984ebd9116beeb55cdde4c5c86c023e5d

    SHA256

    1f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078

    SHA512

    d860132106a1c03dfa23f983b3c503f1216ac02f3d47833b96dfb333fb30bc8ab4d4fecd1f1f0a89f0c7f3586405461e2d53c26f282bb48970e549659b364b48