Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 23:33

General

  • Target

    eea615c97376ca92904515cda28ee099_JaffaCakes118.exe

  • Size

    553KB

  • MD5

    eea615c97376ca92904515cda28ee099

  • SHA1

    78055de07794d959bd9a04928776fede0986abc3

  • SHA256

    a9dfbd919f62032e85f2fd39b4c905026ae622bf12216f3da6790e3c37d97133

  • SHA512

    c97b051c700e1f574cc6ed131a60a14ad4f123260d6fdd54a5cffc42ec29d86855d5dcd569e030300f5a597aa89b9568413ae4de3f137b40f881b8b7bb2874ca

  • SSDEEP

    6144:ue34R2fOqzwoN1zh36dqXEV2rnCeZG/t7FTBqTzP7n7O7L6K2Bfo7p8:A2mQzh36VV2Go0ZTsnz7O7L6ju7p8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eea615c97376ca92904515cda28ee099_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eea615c97376ca92904515cda28ee099_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2808

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsj7FAC.tmp\ioSpecial.ini

          Filesize

          1KB

          MD5

          e9e07ebfa0a39e8635c79a0260b5408f

          SHA1

          bd2f46e437a48495aa4f83ec3c0a9118e9584902

          SHA256

          5e3055ec89071c0cbdbcc04d2ca920f50ac8d98969988ab89b34b66f02350925

          SHA512

          573733a866b852bc6104036d7c3e4970e7b38a62de0a21b8aaef192823c37896cfa28e27f3d62bc4f36be2c3971e95e4a30e3bee3ff00237418ccfa32d655d89

        • \Users\Admin\AppData\Local\Temp\nsj7FAC.tmp\BrandingURL.dll

          Filesize

          4KB

          MD5

          71c46b663baa92ad941388d082af97e7

          SHA1

          5a9fcce065366a526d75cc5ded9aade7cadd6421

          SHA256

          bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

          SHA512

          5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

        • \Users\Admin\AppData\Local\Temp\nsj7FAC.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          325b008aec81e5aaa57096f05d4212b5

          SHA1

          27a2d89747a20305b6518438eff5b9f57f7df5c3

          SHA256

          c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

          SHA512

          18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

        • \Users\Admin\AppData\Local\Temp\nsj7FAC.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          9384f4007c492d4fa040924f31c00166

          SHA1

          aba37faef30d7c445584c688a0b5638f5db31c7b

          SHA256

          60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

          SHA512

          68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

        • \Users\Admin\AppData\Local\Temp\nsj7FAC.tmp\NSISdl.dll

          Filesize

          14KB

          MD5

          a5f8399a743ab7f9c88c645c35b1ebb5

          SHA1

          168f3c158913b0367bf79fa413357fbe97018191

          SHA256

          dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

          SHA512

          824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

        • \Users\Admin\AppData\Local\Temp\nsj7FAC.tmp\UAC.dll

          Filesize

          17KB

          MD5

          09caf01bc8d88eeb733abc161acff659

          SHA1

          b8c2126d641f88628c632dd2259686da3776a6da

          SHA256

          3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

          SHA512

          ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa