Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 06:13

General

  • Target

    4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe

  • Size

    115KB

  • MD5

    4637b458169f1a616b39dbd69be2c588

  • SHA1

    fd8e3085fa61867d9ab71dec5772eb3b1bb4022a

  • SHA256

    a8726e2dca08427204b95ce057baeee7959482719223d4f457088d3f9249c6d8

  • SHA512

    15b8f8f350de5985798f7adf4b28026e0dd3e19028ea76c8ab5ada55ec46a8bd9f1ae3c2cb973accb8411c862b4848df6da4a1d05b2b753670b7525116de0f5f

  • SSDEEP

    3072:SXu/MVID9mJ0oV2vDVylswCRWBifUQsNzQEnvs4M4:SjCQ2vRylqRuiNsNdnvs4t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nstB0BA.tmp\ioSpecial.ini

    Filesize

    586B

    MD5

    c53e78ca7ccd5b453e60630734def424

    SHA1

    de67fecdba79c484fda5c7e486c27b11a43dc782

    SHA256

    cef4ab466bcabec485f67c7cb9748dc17ab13fd35945dfdbf6a685fa26c286e2

    SHA512

    fc88731e083fd8a9c413495795c4a2f86ded6fa5ef0cd441d49c31911720e0ccc356c547c467e5065fb115df92d37dd85f8b55a3aa1342a9e9e79fe8ffdaebef

  • \Users\Admin\AppData\Local\Temp\nstB0BA.tmp\InstallOptions.dll

    Filesize

    12KB

    MD5

    07f3b3445f66e1089567796bf3c8be78

    SHA1

    851eb574c1067b23a654f8aa47b17ef599b24d1c

    SHA256

    a505e6c537a5ce0166227dda9f7671605395592ac9f1a3764e8a01b713939db1

    SHA512

    8c56308fff3a947b26fd0d98dbdd96c406ddf967f5d7abee8cba082b6c46a4e575094bb0bb981551ac5160bb5089cf6fb125dd17a659c427e28c07402adab1c3

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    115KB

    MD5

    4637b458169f1a616b39dbd69be2c588

    SHA1

    fd8e3085fa61867d9ab71dec5772eb3b1bb4022a

    SHA256

    a8726e2dca08427204b95ce057baeee7959482719223d4f457088d3f9249c6d8

    SHA512

    15b8f8f350de5985798f7adf4b28026e0dd3e19028ea76c8ab5ada55ec46a8bd9f1ae3c2cb973accb8411c862b4848df6da4a1d05b2b753670b7525116de0f5f