Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
f9d453b677d66ad762d72ad73e1ed621_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f9d453b677d66ad762d72ad73e1ed621_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f9d453b677d66ad762d72ad73e1ed621_JaffaCakes118.exe
-
Size
38KB
-
MD5
f9d453b677d66ad762d72ad73e1ed621
-
SHA1
9023c51adb6637bcbdacfcb4ff226be081e616a9
-
SHA256
86268e34c8bd0602394abdafdefdc2a13feb9b71e08930c17b19ed8d4857e0d8
-
SHA512
de3f8cf4a99199ce1254a99cc42570ad4ffc7ac79ee0bf7d35705574a1dd5e3e02a05772df1b32c9308512f6997642263b5716a809647481b0deee125059214c
-
SSDEEP
768:35Vm/9p7++PCf+PqWnZfa20NuLefoEfZjKoES630tV:e7+H+Pqefa/oCZgPE3
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000c000000012306-2.dat acprotect behavioral1/memory/2972-5-0x0000000010000000-0x0000000010008000-memory.dmp acprotect -
Loads dropped DLL 1 IoCs
pid Process 2972 f9d453b677d66ad762d72ad73e1ed621_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x000c000000012306-2.dat upx behavioral1/memory/2972-5-0x0000000010000000-0x0000000010008000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\phffg.dll f9d453b677d66ad762d72ad73e1ed621_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\phffg.dll f9d453b677d66ad762d72ad73e1ed621_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2972 f9d453b677d66ad762d72ad73e1ed621_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5338a3c7a6874b0ab3ee51c14fbb9e8a0
SHA1a89d405fceae7febe92659d8d3ff2e4188399f6d
SHA2563a34b704475f53af7bcbb9e53311abef4a49ef78429562096c771a61d8f961c3
SHA5122269c0214ff3e5a8a252553f75541bc5a5b2f3e9cdbe2563b783ebbea4e872ad14f9728e5552caeaa8ff298aee29c8928eaa53627d1a628278250b66a98f850d