Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 06:23

General

  • Target

    04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe

  • Size

    12.6MB

  • MD5

    04ad42ef9c8ea1b8bfe00ff8ff63825a

  • SHA1

    f0bdf033a53e5e7f67b89a10a82fa20d86dafe3e

  • SHA256

    a7dd71777604517aa5b1a4660d4f2ff2cf17b717be3c463a69dc6b713ab31032

  • SHA512

    62ea2a936404def736f2e36e2a804d1fc4142696321504195b08143effb2b77435f66fb43efa5d3c51e9167f5ad36aef197d01c97f9a45158f5df22501a38ba9

  • SSDEEP

    393216:I6Aekcrb4eqrbTOj5fcbVKeKKlqfObtpqWED+rzyEz:ILekcH4eq3TixqMMzqirOO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe
      "C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\04ad42ef9c8ea1b8bfe00ff8ff63825a_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Buttons\1_1609.btn

    Filesize

    6KB

    MD5

    f1724915ba1d6aae42665ab1d7c35f1b

    SHA1

    a974c0da0608e687946488c5670b3e87812a6e0f

    SHA256

    5e58a87004c840f07af3e8600ce65b8536394288b217eda64025d65bf19e338b

    SHA512

    1a5d954722e9b930e3ad050d5984996f6eeee574e6234ba41296f3c4e5e6218bd15d306c31c9697b5769cd9b95a78d629eec69c9a6776a8fed672a096ddbcb2e

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Images\bg_about.png

    Filesize

    28KB

    MD5

    ea61af411149fde843c60c0ff356219c

    SHA1

    264b70caf9fcfa96af5abecbb13a4860b5f25b9e

    SHA256

    52633d9e5bec66684a6ade56172d7b11b010c793865ae5e568953f3638b8789c

    SHA512

    85a2fb3113f23067f4547bc874602a996651185247f21747174353622b34b26c7d645705459a24575a913f17431e0d0f9434b4d4dbbda6c53a512bb898f74438

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Plugins\sb_BasicBlue.png

    Filesize

    1KB

    MD5

    a766fe6db2e56800b81241a1aa48f4dc

    SHA1

    5cb82d438e793afbc0397bf9b96960b3bf3bb031

    SHA256

    6bc907642c478a2f6e1cbc5cfe771b621a0be9b0e6c82c06375d306283bbaf6d

    SHA512

    30a21924217c0b7439f7b20f8c5917605981c273513811a767f680449c8bab021481d56d35599fe6e6363dcc006a2a2828f6ddc43bac91a755663ba2bd66dcb6

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\autorun.cdd

    Filesize

    281KB

    MD5

    5bd03bbfc91ed04c93742d6738090caf

    SHA1

    ba78d027b1a71dd2e84ad3cac7b1ad03716ca12e

    SHA256

    59f85254aa032c2fb180aa507b363151f78bbee6f91b066341da11c04a042bde

    SHA512

    ea65f4eb03cb5a7dbd5964d266038a5bf35b9e8f110ff1ab41baf03f8211b46a34fe4dab9cb34d1ce5ae86d4b0070d06042b2ac3701e8c817bf7ce81c0dff0be

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\Icon Entry_13.ico

    Filesize

    9KB

    MD5

    70452368b1b3b59a130a1c349099f689

    SHA1

    5907ba88daf4e7cf92f57e3d4196a99e482b107e

    SHA256

    12bca27ceb9e637f22425a38f4350ec82b09cf1bf01cb83af6369ba19ed9a354

    SHA512

    67081b243ad2794cb4da02a5b7db810c7bb5b45a72f67febeb7ea1baf48abbcfdf3db9fcf30862d0dde17e76fd711523d32706fda852c24678289240ca37a121

  • \Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe

    Filesize

    2.3MB

    MD5

    e1f965ed5a08f8aee081e63faf933bfe

    SHA1

    31b4e8b443e843cc63c34ef248c564fd3cdd42d2

    SHA256

    59d2d9dd8c0c206099c5bbafdacdaaf9c007668899eb5ed89ae62b9ee3abd687

    SHA512

    2d9f573069a0672272c50efbcfba0e7bda0fc135118416838cf0e6d8e0af1ee23d13d655a1ec1493b6ea6d88b8ef95ceab37bdcc1e12b7515b4b40290a7f3c34

  • memory/2100-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB