Analysis

  • max time kernel
    100s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 08:08

General

  • Target

    e20b3493db09b08aee18afc81f3c462e_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    e20b3493db09b08aee18afc81f3c462e

  • SHA1

    0192043a809d74ffd48c7e1b0be824054ed92c7a

  • SHA256

    6d5830c78616c9319393ae816d4dd81c54bec8a76bfc2fbfeacfbd2bd343d048

  • SHA512

    f8b768c751daef145bcb60a7f7acae86b8a5cb046d3b5996d98887de7737f135c9b42b490ef60bea87b10794edc1759f45a769345022e60cf01a2a7922ea917b

  • SSDEEP

    24576:wRbyp55p8D0/p+CV61TzMjFJ+S50T1ovadAK+CtDgQPvTLMcMQEEljbPw:Ou55ECVATwjF3u1o+ARKg2nEEljrw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e20b3493db09b08aee18afc81f3c462e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e20b3493db09b08aee18afc81f3c462e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nszCE0A.tmp\ioSpecial.ini

    Filesize

    611B

    MD5

    b13394bb7423369a7a2be77058b9f2e1

    SHA1

    c9c55f63c81705a829048cc0c64c5a6b8142a6af

    SHA256

    db5d18535865ecc9a095d0950833eeb876aeb69308b6782ebe65d42bcb805ea5

    SHA512

    c6198f148dbc357f8d4c185226bf331572a9a5ea3b0b2de53f8962e2526b32bc981f6c5ec88ff6bd1e23a2ca6b50ebabc8712f46004a06a56cf31cfc52950ce4

  • \Users\Admin\AppData\Local\Temp\nszCE0A.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    0dc0cc7a6d9db685bf05a7e5f3ea4781

    SHA1

    5d8b6268eeec9d8d904bc9d988a4b588b392213f

    SHA256

    8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

    SHA512

    814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0

  • \Users\Admin\AppData\Local\Temp\nszCE0A.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667