Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 23:43

General

  • Target

    df1bd179a99115f0d5283c1eccf1b4c3_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    df1bd179a99115f0d5283c1eccf1b4c3

  • SHA1

    3f831136f4621543641b0230782375565f05bf87

  • SHA256

    d7c1861490c04999007c7b0a461b0ff008008960de3cc68fbd5605f1dad682f5

  • SHA512

    90e6dd63feb39c226eac498eb9d1982a02c9d92f8eed6b16292cb62b0a37bb0533111963c549305620f15ece34ff65cf25b95c4cae2ffd89db611ce80ae247c2

  • SSDEEP

    49152:kQIdlEfnkSetNFRbwijuJHw3cLcXtQEwasf5H6VL8a:kQIdOfkDwIoLcdC8VAa

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df1bd179a99115f0d5283c1eccf1b4c3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\df1bd179a99115f0d5283c1eccf1b4c3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1928

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsoE419.tmp\ioSpecial.ini

          Filesize

          1KB

          MD5

          3e87b1f6ded19cb3a74f607588920663

          SHA1

          af4e2486006879780c1cff57241506d37c098638

          SHA256

          3c4662221c2374a2879062905396e3922721e51ae7c8c9250b164bdebe3a5505

          SHA512

          efbbcfdedcbdbcca1db44967e077397cc9b958d62d5b7902143cc6933a9d2356269e3f422b00ad730cd50a0c49c59537d2b1ce49813cea4d9f8ebf6bd4a77c5d

        • \Users\Admin\AppData\Local\Temp\nsoE419.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          fa5beae80dba254fb6c21b58265f5310

          SHA1

          f2f776611dbbb157b151aa744a7e0be1d4b8c079

          SHA256

          34b8a2130729064ca2f9b3b8e6f90d883d84662156b648a4eeccefefc3473269

          SHA512

          7c74b9e9f1ff0665ffd6fcf76fca462d9f4fbd7c4a215bc67b419497ef4c3cb9cede6c5b0803cabb316bc5391c4c6f0d578d36e1094b8ed326b140f8e272b538

        • \Users\Admin\AppData\Local\Temp\nsoE419.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          7eaad8c651cdeb4a71355b10dbe8d17b

          SHA1

          1ef6cf4f98c7f20238e548dc6cdb270b741cfe8b

          SHA256

          fad96602241e65daeef96b559092e7efa2c3b68948a65f1bd7f126b9963df468

          SHA512

          6f7867774bfd82b1d12d0db5479e9539440ebfc6fee54aafc4381edea8fdccb89a9521a60b5f907033c147c805e6f541ec534c56bfe5f7354c55ca04df5175b9