Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 23:29

General

  • Target

    154eefc01f3c9f98656e41e62b51f215_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    154eefc01f3c9f98656e41e62b51f215

  • SHA1

    4cc90664cb74f7b3b0fd601cfd71bbbcbca41956

  • SHA256

    4dd5c5bfbfeac773c775b5f35a0fb56b60b76ef50ed32ebc11f2f5c1af15a44d

  • SHA512

    b8533c733d3bc4169bf1c4633592c061c0d445dc8782c3df6a941c1498d2f3846528bb5f5975beba298019d0c8fbb77943b2542c9257bce52981563b1faf295b

  • SSDEEP

    24576:ip4+sZ3B3w5FzWda6rKB466SR2GJCMDi2feYqI8J8q8S6H9Y+gV/n:irS3C5p6OB4UJCMm22YqIU8tFKB

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\154eefc01f3c9f98656e41e62b51f215_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\154eefc01f3c9f98656e41e62b51f215_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsn8157.tmp\InstallOptions.dll

          Filesize

          12KB

          MD5

          83304a78d2b6ea45ea8404f4cd78721f

          SHA1

          d5c5d19653c751c08579dd094bcc9fef1841af00

          SHA256

          92344973083c0a5d8f5732814c1315124e8e0a2f1ed912583a081f95f7549414

          SHA512

          94076cc935927925641d668c19b389d007ff7e8623f2afe706fc73d1ecb97210577a828a727404b200d9870e14b23d6bd047de9201d629e7443a929c0740c67e

        • C:\Users\Admin\AppData\Local\Temp\nsn8157.tmp\brandingurl.dll

          Filesize

          3KB

          MD5

          9c3488b5e9655d1837c3963ecec33f70

          SHA1

          f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3

          SHA256

          05ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a

          SHA512

          6af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7

        • C:\Users\Admin\AppData\Local\Temp\nsn8157.tmp\ioSpecial.ini

          Filesize

          704B

          MD5

          af6ab1a40fce4c1fb071b1ee60080053

          SHA1

          4d58266db67565f1276c9939e744da499ae0395c

          SHA256

          30660a00b4b104a931be92acd56accc9260466954fe3da4eb8979ce1c347954b

          SHA512

          4dafe6f671ae151c3bf78efd78fac4ae58db4cc4f68c181bf2276675e2f7bd3db479564180f6304b21359db5bf2dafbbf837d9a4f2581db2693431d2c9a2480b