Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2024 10:49

General

  • Target

    fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe

  • Size

    3.2MB

  • MD5

    fc238d56038e9e5094038122ab07f016

  • SHA1

    a6eb33748cf13f597e58f6d54e07dde03f5d041f

  • SHA256

    15be226231ee990233f181c74ad81a71205dcad0d212f33acf6c997f2867462f

  • SHA512

    76cad4bae7cb4c54c3b6ccbba6fc0e2d6511c8dbca07ae15738f4216c0e37be15e3a73b0b9a2fa4fd4be38d088694f2528a3f7fc3a313b4eb2c87a462a6b49a1

  • SSDEEP

    98304:zvtgs39n1t0udUbvSIzHqxrweXZFhmU5j3sY:zvSs39nT7ivPKVtmd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc238d56038e9e5094038122ab07f016_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\nsA21B.tmp
      "C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\nsA21B.tmp" "C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\InstGameInfoHelper.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\InstGameInfoHelper.exe
        "C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\InstGameInfoHelper.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabB06D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB08F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\InstGameInfoHelper.exe

    Filesize

    98KB

    MD5

    ec08c1c867ded8f5221aefb969b161c1

    SHA1

    839866cc28b401d1d3f0f07aa8f13803f56b496a

    SHA256

    f3bd166834e626631abe30c2353dd1c015d8b9cf6b63cf94164478e6cbf3c0be

    SHA512

    34c35aab50e9207bdb50cb619c0882b585577b46cdd23710663dcfeceaca8b7c4248e082ad28c2718201225c42d0ad559ebd0ebe904a588d324d50d44774a7a7

  • C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\ftdownload.dat

    Filesize

    512B

    MD5

    a7d80ce4c7651bdae8bbc2e149fe76b2

    SHA1

    46724d4b90d484f12e6d0531c25c5e7abfcedfd2

    SHA256

    b8b34eeae2da1840b5301665fd2e66def8c8a28836eb87752187f1510dc82eea

    SHA512

    4dff4dd2f1976c5bc829821def2ae9255348864280471a3141cdf368cfbcd5ed76264a361e67e7eaedf81895324d336978a3bdabc7abb5dda2cfc18cd0494f13

  • C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\gametitle.txt

    Filesize

    7B

    MD5

    ef204df0430a7e6dc01fd819de9163cd

    SHA1

    0046d09b3d18e4bde7f8e917c5594790b27a708b

    SHA256

    5418d8082209dd2664d8d98045dc8f05d29f4057841f63250587c71e8dd8b001

    SHA512

    7b5cc5c1b86be312ea970ffc2b11297e7d56a152da5a3626b2c39e01b787d89e49dc93db43d1abe125ab1b706347b48a556892a84fde2736d845e27d47ffe96d

  • C:\Users\Admin\AppData\Local\Temp\nsdA20A.tmp\tn_feat.bmp

    Filesize

    243B

    MD5

    1d11ba4729a6d313267cbc240c9f6534

    SHA1

    c98f13700cc67da29321ea5d189d17eae7a63e8d

    SHA256

    d677a4238239e10beabe388a4aabcfe39ca150d6a51f404c8d8be27aff1de449

    SHA512

    4e8cfd51258882fba8f3cb5d5cbe42c6f70237d0b3d70d60105d104a53a324e22836b18d8dde8d7529241c581bcb093965d04800a30a679cf2229b241ec13dd8

  • \Users\Admin\AppData\Local\Temp\nsdA20A.tmp\System.dll

    Filesize

    10KB

    MD5

    7d85b1f619a3023cc693a88f040826d2

    SHA1

    09f5d32f8143e7e0d9270430708db1b9fc8871a8

    SHA256

    dc198967b0fb2bc7aaab0886a700c7f4d8cb346c4f9d48b9b220487b0dfe8a18

    SHA512

    5465804c56d6251bf369609e1b44207b717228a8ac36c7992470b9daf4a231256c0ce95e0b027c4164e62d9656742a56e2b51e9347c8b17ab51ff40f32928c85

  • \Users\Admin\AppData\Local\Temp\nsdA20A.tmp\nsA21B.tmp

    Filesize

    6KB

    MD5

    8c05c6c4c781d8da520ab78f9a4a1c98

    SHA1

    3e883bc548fb51c8ed1880c8b91d9fd4ccfb2033

    SHA256

    2cf3490717e10af42d7995a95cbb17df4dc7adf7ff143e9c386651c42b7a3c60

    SHA512

    d8ba933c457a0a53434d9993995fb3e94d4297d04d1af9bffedf20485b67bba7e6ef7ea18b821ae5d85dcb09b2e71fdc015fcccc949904b80cb17d90d0e2278b

  • \Users\Admin\AppData\Local\Temp\nsdA20A.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    907db8118c510976d58a75dd9cf7d0e3

    SHA1

    90446f992946000038807d2966fd71e30e61b1c8

    SHA256

    d166786a2091215ab6360853bc591e7045dd9bc697f45f0b19332b8d629af32e

    SHA512

    f2afc42f03d95ef68c113cb13b47f3b027e5cf8ce7b492a4c15867d72bcd81122d2c70786c52146ac65d5b9e137ed15324b7515f089be3b3efc6711dc0c6e146