Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
472cfc972629da5106ce51696f7ce97e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
472cfc972629da5106ce51696f7ce97e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
472cfc972629da5106ce51696f7ce97e_JaffaCakes118.exe
-
Size
193KB
-
MD5
472cfc972629da5106ce51696f7ce97e
-
SHA1
ce3bfdf58c21e441dad79865a9cc8092cb1710ac
-
SHA256
24807a0e02c1c2d529229f9084de1baac9157725d4de245ec3313572f596c849
-
SHA512
2208fe39995cc300792c13a201258f09b9e665fddfb3d3fcf8b9a45c5cbd05b5289ba9d7b7b7f170d51f0e06c5755ca3f7a083054c5cf53899262c7c9a6a5c04
-
SSDEEP
3072:y1xzOBwr8wDNpv+bCa7lsSG7g0k0QyDpe8Vrqs7OtSMKvx9q3/LuiFb:y/OB5wDNqllm7gK6iqs6EQ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000d000000014698-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2896 472cfc972629da5106ce51696f7ce97e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2896 472cfc972629da5106ce51696f7ce97e_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5fe763c2d71419352141c77c310e600d2
SHA16bb51ebcbde9fe5556a74319b49bea37d5542d5e
SHA2567fdf10ca02d2238e22fda18dfbede9750da9f257221802c8b86c557c19c9bc7b
SHA512147b3a525b1fef98ae46923dcbe25edfcf7b523f347857466eefa88f09ec053ba309dfbee5f1454ec64aba0518ee21986c4b6a506f8550efb1163c8f04d7482c