Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 07:01

General

  • Target

    eacf4a58bae1cfd03a7ad157623b4e2e_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    eacf4a58bae1cfd03a7ad157623b4e2e

  • SHA1

    c7107f839869de8ecd6bd444c599936e61fa0edd

  • SHA256

    03cec975ed0d3f99eddc64e46b3f9a4beefbc87f118ed498337cc7de0b75b4f3

  • SHA512

    1a580e5fa65c9c0b01bed9a52a142b91b1db311fb8c3a075d53434e2d17ea2a9306fd38be55c720da56f0c23f70bedbfbb15820f735cd43021203093df33a036

  • SSDEEP

    24576:QET5zh36rA0CzFvnsm6iGbQ/oIKikelvQ0ZTIz7O7n1:J5v1B0hi5A8TIi1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eacf4a58bae1cfd03a7ad157623b4e2e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eacf4a58bae1cfd03a7ad157623b4e2e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsyD4CD.tmp\ioSpecial.ini

    Filesize

    1000B

    MD5

    3b08832dbd081583e86b38fb680d3b99

    SHA1

    bc71f0077c2b11e2ab75860a3fc6dcbe41f1602b

    SHA256

    62a49640e720b69503027d4ac29a8bc897bf55d8e1f7f4bdf3d661545d94e88b

    SHA512

    00960144a09013988d7e723da10755597fa76f8f0f3ce3d1c181b5af6ecbdba98a5a299678fc688090d278d0dd3b2d35d0a5aaf3edcfecaedf64d65f3cce032f

  • C:\Users\Admin\AppData\Local\Temp\nsyD4CD.tmp\ioSpecial.ini

    Filesize

    1013B

    MD5

    8af9a1dc9266a1a389e3e184d3a5ae70

    SHA1

    46c1f9b4ae685e5295e08e3cd16935872eacc282

    SHA256

    2f51478845f73f4c9bf3c3b96d54e8b9e4344bbfb6ed1899ba287498aa8d84e8

    SHA512

    04afcf0b3c59d16abdd1676daf8f609889e993708e3756367c803c6be5b573b1167ac35f1aeb0d8d549f889237a120c90d4f0b45b4e06abe6b352b83f5a7e70c

  • \Users\Admin\AppData\Local\Temp\nsyD4CD.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsyD4CD.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nsyD4CD.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nsyD4CD.tmp\linker.dll

    Filesize

    7KB

    MD5

    122754bdae09014ed8be78a8dd3618c0

    SHA1

    8a1d4a0b8202d2261a12d97aebfe33144c274444

    SHA256

    67552ebf58e98e841dcd9f4213ad3eb134d595f04839771618f0bb1c48ea2b92

    SHA512

    7b9b5f8b52db793b4833a75bd8f122f28f2df00d43bd35efc831c2b8457009d51fe39874c691389c2fdc87ed411919b59da50199e3f719bd4cfb166367f185d9