Analysis
-
max time kernel
55s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe
-
Size
653KB
-
MD5
044f31eba4d6145925a9a262eeb00648
-
SHA1
aadb6d1f97f45915332f02474667d399baf0488f
-
SHA256
22df97136b027bd1fa792c036dbda3675dec070db3a0e032dada9e51cfa7ac6a
-
SHA512
38e616e290d31078b36d0baec3b9562c46db0204b38ca5b64e0315f2bc5e5ca32aed0118c439b8c7c1a1f07fdc80c0ddd67c5a57285357cffad7b1655b4f4e3e
-
SSDEEP
12288:SKCFG+pl1Hp7p4ZkuRt4Zh3UdOxouSdWE7uglrB/jmN7Trkfcn+z4:S3Xxp4Zkuf47kdtdZ7uC/jmlrDn+z4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\versioninfo.dll acprotect -
Loads dropped DLL 17 IoCs
Processes:
044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exepid process 4552 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4580 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 4236 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\nst371F.tmp\versioninfo.dll upx behavioral2/memory/4236-208-0x00000000032E0000-0x00000000032EC000-memory.dmp upx behavioral2/memory/4236-416-0x00000000032E0000-0x00000000032EC000-memory.dmp upx -
Processes:
044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exedescription pid process target process PID 4552 wrote to memory of 4580 4552 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe PID 4552 wrote to memory of 4580 4552 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe PID 4552 wrote to memory of 4580 4552 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe PID 4580 wrote to memory of 4236 4580 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe PID 4580 wrote to memory of 4236 4580 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe PID 4580 wrote to memory of 4236 4580 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe 044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\044f31eba4d6145925a9a262eeb00648_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD53d8665da9f10eb1cee52aa10aa63103e
SHA1c93598630895b60cabfd22b4fc280158f70e75d9
SHA2565894c927a6b2d7c5c0d43bcb24ba6235ed7a2a1e8d115e3fcea910723eb521d4
SHA512e5a06fa3286319dada66cc0754bd8881698912c917c9b900f22b54f95e3f4b05577b473fac7bdc0ad1ed83457e200103ff2e3361cc6c9b21f969939e4942f7b1
-
Filesize
11KB
MD50a29e1b270ccea61aba7d7cdd10e0388
SHA176bf03361bcaef475ffb864bc1903c9bcaac7b44
SHA25667328334d53e7c0c52c23ef5febeb1ab34d87ab7699868a9f547e5b0db4fdceb
SHA512d024407b0852155c225852e6dd1a5440241a16c4b54a408606318ad142381ebf51bc8db09a4d175369619aaac2224311914892d23f763f7b533a6b664b93cf7c
-
Filesize
18KB
MD581f3897e210d2c45e9da3670c7dbe4a7
SHA10f5fd37672efd549b2fbf89770ed5c95f388fc86
SHA2565afcc891c767234cdd33d49840f35993cb23d6e4f6c31d0afa612deab9c185c9
SHA51206d7be2569a0919f71d427f2f71862ff66a58c63103f714790c51152a359d3057d1208525de3a17d9e6ebca72991e3524689d28cf750ca86f692a1ea380cf83e
-
Filesize
193KB
MD5e390287499549de31da007f7f0ae4d10
SHA1a8c6caebb151d60ea56f4c96a7194c0e5f076692
SHA256b2e3b0e8d6c3fd23dc7d94fccc5151f07bf2e59271431268a58b5e99074b825b
SHA5126c393bca7ea74747917e65f2e5e4822f034ef60defa5f3232b8f9a731ac8e00cffee3d44ab817f3986739b685506e0027647de50b3534e3436ca569d0c25b474
-
Filesize
45KB
MD507e03b7a67edf8aec9fa104ffb26b69f
SHA1b2cc254605bc136e9f1bd29c6dd90eee767b2cfa
SHA256293487a745a18ca2054037bb7a69ca7c4bbe19c1fee7ce62cf88672e9b2d064e
SHA5123c2cdc34bb9c18329b475daba4a68f4fe5dbb829e45871286f0ccd3fd475d895830f31cf091e909986367da4c00e0a651c1405f9857998aa5800389d73aa2542
-
Filesize
4KB
MD57dec81a81d64a228af2aa5dddce127b1
SHA1304dc81198081ca2d015ef7dea88a987c7910950
SHA256a6aa1794d8bbafe238f8ba92d62f18bd61ff7884e591582390f3343da3550047
SHA5127ee2dc6bf040ccb1204d90fd025254e7e425eca2fb6a71b18a1c8cdfd489a88c70038e655a29d26e482575e0cc83d585499cc5e6ff215d548befadf117cd156f
-
Filesize
15KB
MD57bf73b6249ed6cc73bc9af1fe5d3bf6b
SHA17f25228043b91a11eb02e443f2b3f20e88edf008
SHA256f4c4bd5657b442b51e962d6c05ad79befc911d217f4131f8a6074f018d32dd98
SHA512c2989717fd2d2676ed2ebcb2a56a68def862f5cbe721c0ce0f0a68a0bc9147a6a6f4a8b41f085a17709cdaf04cf79d5621eff198a1ccb0007ac6aa852526c93d
-
Filesize
8KB
MD5f273a694acedd917336a47ab09efe2eb
SHA18ff862146d5f939ad4de785a9bce2378ef5b8d98
SHA256065a0d4ccd9d5019cb97232a67f5c5ae3e6cb943b48f263f1d1eaf21e15c0e5a
SHA512aeee518d9ef1659372b9b46a09f7bf22ae439e8cb5abf6c588c8fc7971d534388e4ec3ca3fa1e02fb374ee3c5b399e94430eaab87423cbec385ca2db4aa99d4d
-
Filesize
392B
MD577c50916f90b43c09e38e07b94ce4356
SHA12407be8f458d1aa2f1ffa45b21f782c44e68331f
SHA256902fc7d3982d9386d60c4c304574381563ee28e73de993e28cde7f90499ca1cb
SHA512039a24175948dfbd8c23b070d3aeb7bd93186a6093cbbe760981f1ef87bf7f97ed1f6bf5c6a7d2b9b12834e6776da03c40a03f7f43a9d7803a7f459a8a023ccb
-
Filesize
8KB
MD5e440044afe6c761507a996b5b45ab0f9
SHA1ef772c758fd5d6098b41375f35ac26f3963cc306
SHA256b1864aed85c114354b04fbe9b3f41c5ebc4df6d129e08ef65a0c413d0daabd29
SHA5128a82df90459929de1c91ed29a122a149749d42adbb85faf0c3123d0f0886babc90cb93de85105feb7497b46552a6747ae05b985f5a488d1d8f1a2a7db44077b4
-
Filesize
80KB
MD54bf7db111acfa7c28ad36606107b3322
SHA16f20b9f6663ce0c309a2ce60e718d64ffb6c75b3
SHA256bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0
SHA5120a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6
-
Filesize
25KB
MD50f26c6d34d3841e93145dd00d0175651
SHA157b068569d0eb2336503beed87589629ab2a6f1f
SHA2560cc5dc45b6a04ec236f4ecf0eeee212096b1561179d71c49dd5fc82aba706741
SHA51272785e520d78a4ebd8779e5497806406c1b91b9c05ed82a392a6af689781e26c77f0032c66540b80e2e7e457128df2afd0647b0dbc970a11d0cd4ee3930d47a5
-
Filesize
11KB
MD57292b642bd958aeb7fd7cfd19e45b068
SHA119a800620d041634abae5b5d096cb0e87ce4c188
SHA25690f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09
SHA512bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a
-
Filesize
10KB
MD57e3c808299aa2c405dffa864471ddb7f
SHA1b5de7804dd35ed7afd0c3b59d866f1a0749495e0
SHA25691c47a9a54a3a8c359e89a8b4e133e6b7296586748ed3e8f4fe566abd6c81ddd
SHA512599f61d5270227a68e5c4b8db41b5aa7bc17a4bbe91dd7336b410516fa6107f4f5bf0bbb3f6cc4b2e15b16bf9495fdc70832bab6262046cb136ad18f0c9b3738
-
Filesize
4KB
MD5d02a497be5f89c44827f142c4662f591
SHA138f83ccbac11de069df0e1cd79a6fdf7f006516c
SHA2566d29dfd24695535b5973d8261d93373603ceaae03ab97662fe1b3dcc47d18226
SHA51281c87f9d56a8ab7703a4effd3ba7b982b6765ecbdc0dbb1c595f549c4310a5db57dcdc38929eafe56983ea8cefc0b572c3faf82a4b62eb7c564b05550215f1c1
-
Filesize
13KB
MD5d4913b3dfc6136467ca1367e5464f32f
SHA1f186c17758c4b95770f2bc4004e3f672a47d12bf
SHA2560ed1939e72fa1e6e24e5c3b8dd1ee8604b4572711d1274fa16dd0d3a46d6b848
SHA512c0e40fda1bf6833a039dbb4046439b25321789d0395a07832f10b3ebe5051d6905a506f1922f0f3ce54a78795e495fe2c08899f2254264035e7fe236cce3f4f3
-
Filesize
8KB
MD56a544a1476ac90d7083dfe39ad6ca7df
SHA1e6228d3efb9bfafc743ec174cc8c6d3b5b58a685
SHA2561994f9e3e7ef24737ead6cef4bfe1984afe97ee5aab758ca73058ed7f4419dc7
SHA51224b300d1e66f1ddc38635e517f6a83121fef2049e30269eb83d8fcd7e838c3e25d12567d717e400148ce67940e16fdeefce081d95bd80e8e605d557eae65e30c
-
Filesize
2KB
MD54bfdaaab9014fe129bc6388fd5687c8f
SHA12c6ff28245e1dc7ec9ac1c43c3cda354d07b2c4a
SHA256e9167e0da842a0b856cbe6a2cf576f2d11bcedb5985e8e4c8c71a73486f6fa5a
SHA5123a1a4d838bb5cafe71da262ee7bd6dccbd30dd4d7abe0d04f6ecf96bf704d5e111967be812894a47f2eb3374ee110620b7cc47eebac8b72ddcf7f506ba82a607
-
Filesize
4KB
MD5f74fde2b2767ee1c6bd629f1f4e86843
SHA169545a460f4ab38a2e952c8027616edced07ad20
SHA256d0072d2890f1cdffaa802be7989cab29a24e38508d53ab47ef9e1c40b0c2c52f
SHA512b62cc38fd1694508e46ed56d57043d6028a1b472b52737a89cbdf55be641b95e03f16160c24df247cb7a2d0be11e108b4db5a43ae0068ae3b87baecb4aa82413
-
Filesize
56KB
MD59071d5a0acae2381208e2b08f683ab7d
SHA16b5cb2e7ee1b5db330b1293f87f5d01c04b32f48
SHA256b07042324547c647b9288d2ab3ffc27037c2751ddd3739fe5b1f097d95d5d767
SHA51299af41f8fdcb692796cae9a5fde1ce5d312e2e34affbd8915f02f4690774bea339eb32a00e27d8ae9d1bd980a080c5eddd553b51f1363581bad9ab6ca0a6eae3
-
Filesize
52KB
MD54a4845ba1666907f708c9c10a31ec227
SHA11ebf626adc84147e5114885ce779f92d6eb68f3a
SHA256a1ffee9687ab4a23a78b3251888aff09e2896d76f8d16d713367b265f125188d
SHA512d009f5e2a2ecfbec5e5e788ade142d612846d0c99921774e4a11b060998dfb0680cf1e1a54604535d5560738093f9ae166866cb23eee5c7d9c4e5cc5a33e7464
-
Filesize
2KB
MD58004e3f267460e8a83ed24b72291f6b1
SHA101766537875cddf1d48a1d87e2048641c1b4b368
SHA256d2c6858503e065ac5f751365349f236706edbfbdca4b86ed7ea9ef8626996c48
SHA512995b2bcfeeeb7b3a329169973b2d9ba9f69e1042f2b74bb65e9b523c158279425f1dd0688eeb5291850580fd3bc053ac099bd055b8b31ea92625763446525cda
-
Filesize
255KB
MD5fceee0026aafd237afdb4aea4ecd3557
SHA13e10da57143599eae915a688178abada78b8d82b
SHA25685db1e17c0fad08d9732405e781cda1e1613ace31c540a6e559cd8777df2c62c
SHA5129c974918c8afec8d8a58fc1239f269544b9dfe867459bb61901462f56f71a3dd574d3b2263dd14b99ff8a23c8096c408be3620785fd4476b975a43b999f559f2
-
Filesize
53KB
MD5244facd25b2b0dd97d6e1ddba949bf63
SHA189b6fa12afd1dc5aafd2bd1f42bb3ca961ed6cbe
SHA2564b364b85f26909c422dd344fa4863ea9649f05cf349ed6c1d8116811e3cdf6e5
SHA512a1f4fa96913079e0ddbd3c603073b6edd6e5d835470e5655ce8f04088e958461836da4a8ebe3169366c0bcd35bb6c73267904ecf0a0b3a822a55c914e259177d
-
Filesize
6KB
MD5ebc5bb904cdac1c67ada3fa733229966
SHA13c6abfa0ddef7f3289f38326077a5041389b15d2
SHA2563eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75
SHA512fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f
-
Filesize
62KB
MD54e08fe995ab74ba4d145ddb77ea095fc
SHA1e4bb337e40069c097e7abd566b7427b11fb124ee
SHA256ace3c561f186dfbb5c992f85ea2ab4d3061894509af6960e9d819152afa46b17
SHA512b056fbe0e79d90f8ce0908eb2b75f589e4415ed462868aaff6032f12dde394058cd221d317b92fc4809aa27d6cf2e801c4215db3cab1267ebd9dbc9af7b7041f