Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 09:49

General

  • Target

    055407d5b5c7bc1544a9d5fd8e0e1357_JaffaCakes118.exe

  • Size

    2.1MB

  • MD5

    055407d5b5c7bc1544a9d5fd8e0e1357

  • SHA1

    127889e86ee604ef10a4f386ad18e18c856b6a26

  • SHA256

    9be83a22321aae449837d4ed462bc7b09dac25a052379b33b3d369921353c438

  • SHA512

    170dc98f2ca7c71686dbbdd2e5745e53d0aa02f8c2e0d6d1143f2c9dc1d4c52917998b1b8dd5dc8091d977a1d30b890bc139b840a9a054c47808a433ae9941fe

  • SSDEEP

    49152:ToG2+5Fx0y5OqpwwryqEyLJ7P+MuM3g5329:Z3x0gwwrPltr+ZfG9

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\055407d5b5c7bc1544a9d5fd8e0e1357_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\055407d5b5c7bc1544a9d5fd8e0e1357_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso94E2.tmp\ioSpecial.ini

    Filesize

    657B

    MD5

    1b942963e5c97f34a9ce25a674bf6599

    SHA1

    3bc4c578c700ceca8075cb752150146adebae424

    SHA256

    4bf6db5d342322662ef1a02806fb5d6be5d2365d9c78398a12b1659b9409a995

    SHA512

    84de435a904ec46431af78de315027cc104c5bd458b0802396d6303aec7c31c68cc58a8c7419f374bcdda3c110bea05618e67cd7f82771582fb2ab5506e3bc5e

  • C:\Users\Admin\AppData\Local\Temp\nso94E2.tmp\ioSpecial.ini

    Filesize

    696B

    MD5

    9a832b0ba157827128a387d5dfbbccf4

    SHA1

    ab4d0a71e27eae9a77e01100a74157244b760cda

    SHA256

    f969b74e8e73f64d5947b353f9304d81cfdf03290b867cf8dec2edd22a981515

    SHA512

    80b1d76649198af618352ec69d4f2656720099663e257e0579afe1c1b50352e0016e809a2e4841d9a8e30de58854c47f96c6dffc043a1c84a77f8719899c5cf5

  • \Users\Admin\AppData\Local\Temp\nso94E2.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nso94E2.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    0dc0cc7a6d9db685bf05a7e5f3ea4781

    SHA1

    5d8b6268eeec9d8d904bc9d988a4b588b392213f

    SHA256

    8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

    SHA512

    814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0