Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 01:15

General

  • Target

    eecb6c8c0e32c2dc5345132fa20cb01c_JaffaCakes118.exe

  • Size

    97KB

  • MD5

    eecb6c8c0e32c2dc5345132fa20cb01c

  • SHA1

    d3362f43b83a7452358d919165131ad606394795

  • SHA256

    c337f1fdf28fff67d61bd7596193609010bb1f974030a4b74c6c95a8aef6f10a

  • SHA512

    4a49d7c3a231d60d28bd682a987f2fc7cfaafcda331fe01fd390223b79ea8132b567a04131c3ffec67062fe408c85e851b538bb2f637e98c657cfcfd56c9346d

  • SSDEEP

    3072:gJ8Dsp+FNX1dFOvDlXJu0QPb755555KR59uE:gJ8dNXSE1b75555gR5n

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eecb6c8c0e32c2dc5345132fa20cb01c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eecb6c8c0e32c2dc5345132fa20cb01c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    97KB

    MD5

    eecb6c8c0e32c2dc5345132fa20cb01c

    SHA1

    d3362f43b83a7452358d919165131ad606394795

    SHA256

    c337f1fdf28fff67d61bd7596193609010bb1f974030a4b74c6c95a8aef6f10a

    SHA512

    4a49d7c3a231d60d28bd682a987f2fc7cfaafcda331fe01fd390223b79ea8132b567a04131c3ffec67062fe408c85e851b538bb2f637e98c657cfcfd56c9346d