Analysis

  • max time kernel
    19s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 07:06

General

  • Target

    04cca346419520d224086da8e40cc984_JaffaCakes118.exe

  • Size

    106KB

  • MD5

    04cca346419520d224086da8e40cc984

  • SHA1

    5fd29603973413d3628366aa1f10f3d686aec395

  • SHA256

    6c5690f19baeff5afad2f867da3cbc6830fc2ba1c66046801434cca670b54df2

  • SHA512

    4b4f897e222860319ae68844bd8d3430a93ac8add998da61f6c8d28b040381ad15dc3f8f0e2488d1318f274d01277766c86423cac551925b7e5f8e521346e805

  • SSDEEP

    3072:RgQWixRJzNuQskn8xQ3WUu0/DaJP0Q/UkOq:RgWklxbL0Ad/v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04cca346419520d224086da8e40cc984_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04cca346419520d224086da8e40cc984_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1832

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\nsuFC3C.tmp\FindProcDLL.dll

          Filesize

          3KB

          MD5

          8614c450637267afacad1645e23ba24a

          SHA1

          e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

          SHA256

          0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

          SHA512

          af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

        • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

          Filesize

          106KB

          MD5

          04cca346419520d224086da8e40cc984

          SHA1

          5fd29603973413d3628366aa1f10f3d686aec395

          SHA256

          6c5690f19baeff5afad2f867da3cbc6830fc2ba1c66046801434cca670b54df2

          SHA512

          4b4f897e222860319ae68844bd8d3430a93ac8add998da61f6c8d28b040381ad15dc3f8f0e2488d1318f274d01277766c86423cac551925b7e5f8e521346e805

        • memory/1832-11-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1832-20-0x0000000010000000-0x0000000010003000-memory.dmp

          Filesize

          12KB

        • memory/1832-21-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/1832-28-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2540-0-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB

        • memory/2540-5-0x0000000000490000-0x00000000004D3000-memory.dmp

          Filesize

          268KB

        • memory/2540-10-0x0000000000400000-0x0000000000443000-memory.dmp

          Filesize

          268KB