Analysis

  • max time kernel
    97s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 11:19

General

  • Target

    de3e7384233944a5675df02e0ccb7525_JaffaCakes118.exe

  • Size

    16.7MB

  • MD5

    de3e7384233944a5675df02e0ccb7525

  • SHA1

    47f65c3214e49b45e3942565e985bd72e7bab2f7

  • SHA256

    2bd0e04437a3ec21f596e4f21f579e6a6f93d033cb7438381f7ea0a2d0495735

  • SHA512

    f2514f73203ab32d5298d6be1be24dcf9bfb0e99d9b3c1d55db0b04658fd02790fa62badfba5e9b0c6d4e15387bcfe2a977f7b32eb63ba6ecb0008a0e110fb47

  • SSDEEP

    393216:bbmWlose4y0eHyaqlHc8QUhK24yosun9JLmaoZybz2tOVoarV3:uWlsZVyaY8w14L9JLmS2tOVo4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks for any installed AV software in registry 1 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de3e7384233944a5675df02e0ccb7525_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\de3e7384233944a5675df02e0ccb7525_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Checks for any installed AV software in registry
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\stext.exe
      "C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\stext.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\EstUrl.dll

    Filesize

    181KB

    MD5

    2c5e13287d27b526c01aace7ea92be9e

    SHA1

    3b7895f3e3f9dfa9797d2cf04ad7d3d5548210e6

    SHA256

    986ea6d67ded7e67cefe739902194751643982293154ba496d4b5076e0df38e4

    SHA512

    51702649d7ccdfd90a1b7d06699d0791ed60fa2419013deda826cfbfac57231fb06000d1e8a3bf866459ad8597393cdf95e559f575dc51c236c3205c69bc36b6

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\System.dll

    Filesize

    10KB

    MD5

    b666f31c4c24be1d4d47cfb55dd35f96

    SHA1

    fee917ead511a6c14538c72539fa740edc7d82c5

    SHA256

    07aefeeea75705edcc3a21ac7dc4b5b837c234c041b725c245b50a73ffabb78a

    SHA512

    6dd69a085b6b2a2671ec6545bae27a72151457ccd76c3bc43a4544f4910fd8791251fb08c2f068d54dd91a6093bed50a80afb68875a9ddf29ae43c42a7337bc8

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\UserInfo.dll

    Filesize

    3KB

    MD5

    6717338e4e0f6283ded89d771c849260

    SHA1

    aa7dcc18d6bf3b2fb0e74466fb2a5d60cc8aa60c

    SHA256

    2d0f153a0a09bb6217cccf3d015100f80216e717bbb9e00eb2482a0964a9c361

    SHA512

    5e3e8c1ce87edf8bfb2556dd5672e1c1e9e37e629fc013167a93fded04e65b79c9b6b192b252daffe45c6d03480f825e1fbf998064edd2771cbce925d85d2280

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\nsWeb2.dll

    Filesize

    197KB

    MD5

    d8113c015116547827b0cdc4869c244a

    SHA1

    82392f5483c6c175b3955cdf39aa87d550266ecc

    SHA256

    b7baa631014fbda8fdce67c8b660de8507aaee9b8c572d21746b3078341d3885

    SHA512

    907c61006a58dcafa812f03fa08b58814950f66e9019bfcc12eefc59b0f7ab2ddee040e2ab162b7e09c3f47cdc71c914307a6fe7b89e11033edea7131fc2f563

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\banner.bmp

    Filesize

    174KB

    MD5

    94715ab02d666f0b19590030e1bd4f8a

    SHA1

    887f618c0ac49ce0209a0e54f6ae97ac501764df

    SHA256

    d1b6bbc5aafc9d3d578d7644d28223a64f6c74b31503e260a76037b7d4bf3ccf

    SHA512

    d6155ea4b62299ed8dd941cd9454aa437a28a6e73e1b4846e18f80fa259ab2a9f819bcd0a8e1cc99ed0e2ae2d8ab921dd041018a08c70bf8a2be44ec0a9442ff

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\estci_l.bmp

    Filesize

    3KB

    MD5

    7df755f1fd4936268507acba151bdbfb

    SHA1

    88244f9f5b1188ddb7cba16668904ea7c8c8c847

    SHA256

    129e7c9241e303ee196cda84fb67ccbd58de350497af64140189189f0e46c598

    SHA512

    2c64e8a7414582c36f3a793c82b64864e0f56c6a8bac5f7bd2ce16b0692c25751383d640749926d075608b8a8827d272a6e6a5d74cb4e89e341f24994d85bf6a

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\input.ini

    Filesize

    2KB

    MD5

    fc06000d3faec4eafcacd8805ebb4655

    SHA1

    8fc0c0fe8e605774382c22949451f9d96b825669

    SHA256

    c682a33f9c606221caaa97b2cf10685d1e002b34886dc41adfc4eba2dbad0476

    SHA512

    e0eeba557baefa467f1f2752d2ec2ed0710208cd5ad85bbdefcf5e4d8ee51795552a0a47a9f66bf0e9d837b8e87b0705b443319847ada34b391fbb770604887a

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\input.ini

    Filesize

    3KB

    MD5

    046916ef37d884db15bb98fe4fced767

    SHA1

    b082e37899d5864b96d95168bc9fb823d6f3e6ef

    SHA256

    1b04b6e86527553dc8fdf7b92b06e73bdd156a156b662c3d5e73278f4814f932

    SHA512

    92bcb49d9b0ac9aec1c00510f1b9cd2bec1fd39667102de7ed67c1fa4872d71cd503d86bd2032d73060273c975ee12d1ab03125761cedc8656f675b38497240a

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\input.ini

    Filesize

    1KB

    MD5

    4921f843046ab021706e1bc52904147a

    SHA1

    94e9cb91662c47c211fac93dd67bc851b15eda08

    SHA256

    9fcd65a200098b9056b71a1a4fd6db3c812ea57ca95f3cf9a32279983ba275b2

    SHA512

    0fdb860b17e7f6b9a798ce1fbfa3cfd1faf01808a28399727fec3d5b89bbf044a889472cd794f67130f72aef630c0f2583eb8d8f537809d90a9a0dc5db427881

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\instro_title.bmp

    Filesize

    5KB

    MD5

    e7ee760c7197832923d16e7066b47814

    SHA1

    48f9ca2f31ebcbd638c7fab602b2ac1094acdf0c

    SHA256

    79ee8e2762f9edbc0eb76ed6f3fc0cd05ceb8a776d0684c71d44b8abb39d8e40

    SHA512

    5f4b79eeaa755ecb184d7b6ea4a4e568435c8a95ea721673c553c59a5208aad7cf8eeadb0cb934f8308caba6e66090046bdbe83b90f67d3d2025445618ff8518

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\intro_icon.bmp

    Filesize

    25KB

    MD5

    e7dbe79c26db8f4b4be7bcfc37c13298

    SHA1

    82150b4c51b51da27360de54e450aa58a4d6ee68

    SHA256

    37752f12c27eff16f03226a4df11fafc50d94be94040e1317f81f3820b43c3ee

    SHA512

    7c4a89fb4c4fcc0dcc83228eb6cb70e282b7c1baeef7f70f527fcebee49bcb8e6e741d8b3e057fbf604e014d1a79daeee587e6f0e12d403ab8af10b6ece761d0

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\lic.rtf

    Filesize

    21KB

    MD5

    9ae1ca9a2435157188b781d30f88f8a0

    SHA1

    dcb4dd1bd4508b2103d881a5acd90a5c46f10778

    SHA256

    ab02e0612084e602c4c4a7149547031f2b5a527c745364db5dbbc4bc581c8179

    SHA512

    3bf656ab5ce1a5e1fe5a2b9e185c60bff15c4a565b224640a6de3143c47cc8b8c0e3a292786d805d788cda36c5d4ed261585f4b9b23a1c2530df8ce0664cc988

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\stext\stext.exe

    Filesize

    645KB

    MD5

    6284606ed3cde0677eed03e9a9e7f063

    SHA1

    e59a99dd2d51fd491adab51a9f08b75bce82c3b2

    SHA256

    3e4e33e0a0b65e5546604fbcd83014fc3d467eb16a3d9cab0e53284ceb9616a9

    SHA512

    c535b8e690e47f11609f84ac494dbb301828f367e0a914263463d29d412c1cdba422767b9f3aacae272e63cebbd22b707577d0de9d566bd96163fac633371b7b

  • C:\Users\Admin\AppData\Local\Temp\nsnA635.tmD\workerExtension.dll

    Filesize

    549KB

    MD5

    e22882c6a4f464b95f0137dafedf18be

    SHA1

    11e845fb4d6c56c63814346c854e89b9138b2fac

    SHA256

    31c46010d24673fcbfcc0f17dceb5fd72520fc92b6a43ae987e35786a50961f6

    SHA512

    d9bc60317c64679f7e95142b10e154be014912aed551abdb871f94b5d14ac3c918b54b281b5f4fb2f00c1761c089ac56e2df8f99ddfb096a9af4a28d1cfdbdb0

  • memory/1644-45-0x0000000003CE0000-0x0000000003D10000-memory.dmp

    Filesize

    192KB

  • memory/1644-20-0x0000000003220000-0x00000000032AC000-memory.dmp

    Filesize

    560KB

  • memory/1644-10-0x0000000003080000-0x00000000030B0000-memory.dmp

    Filesize

    192KB