Overview
overview
7Static
static
74b514c7e4a...18.exe
windows7-x64
74b514c7e4a...18.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...se.rtf
windows7-x64
4$PLUGINSDI...se.rtf
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ON.dll
windows7-x64
7$PLUGINSDI...ON.dll
windows10-2004-x64
7$PLUGINSDI...it.dll
windows7-x64
7$PLUGINSDI...it.dll
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 13:31
Behavioral task
behavioral1
Sample
4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/license.rtf
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/license.rtf
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsJSON.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsRichEdit.dll
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsRichEdit.dll
Resource
win10v2004-20240426-en
General
-
Target
4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe
-
Size
247KB
-
MD5
4b514c7e4a1267cca97b6444d08ee6bd
-
SHA1
f69e70610650e097c7911b0102cba00a4cb54abd
-
SHA256
1241c4be4c372c48f8e027e68a1f4fe894152b6bde497cc3d66af769b50f5f4d
-
SHA512
245b3fcd107377051fa1202dd00e620b21617475d55a25960931a3ea7a2675dda715d767c14b1cd5dc8289b49a2f8257737c7fc8922f4f516f51283fbb627a7c
-
SSDEEP
6144:zAQnIaoYlz0tZx7MhjZa/2z7Bvx3sGwskzQ:9w3qZa/2z7BvJXYzQ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00080000000167d5-3.dat acprotect behavioral1/files/0x000a000000016c04-15.dat acprotect -
Loads dropped DLL 5 IoCs
pid Process 2040 4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe 2040 4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe 2040 4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe 2040 4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe 2040 4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2040-8-0x0000000074920000-0x000000007492A000-memory.dmp upx behavioral1/files/0x00080000000167d5-3.dat upx behavioral1/files/0x000a000000016c04-15.dat upx behavioral1/memory/2040-21-0x0000000074910000-0x0000000074919000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2040 4b514c7e4a1267cca97b6444d08ee6bd_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD529e2dcdfb57ee3ab5e2bbc2fc3c42f02
SHA1bd6cafcce5b70ee15311f9f53e9fd4aac819ccda
SHA2562b7a69e98ed4975fd4eade513cff17099c43b3eebe7e7641696d1d20e8e14b2f
SHA512f71c981b3b5308566b56156462d106ebf8e49a32e55b70891f9d70338941afd347cb4df374fe38b9b3d7309f63dd75a7c80ebe02bb8941d558cd638a6f8daf7a
-
Filesize
11KB
MD566cfc94903c8cfa492fdab42bde2026d
SHA1d07194419d914eae5dc54a480ebddb0a8cb32f25
SHA25682e21860521feea4d15ff7f30538b9d0ed1860747c98549ec85217178a6db632
SHA512ecbc2c9361bef9332fe8e1675d11884c344b26f437eee9db3ec0b5999bf20e16b1d863c192e2091375a870cf8f4674deec16875ba56757b88cc859288305eeb7
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90
-
Filesize
5KB
MD502f1858b3131ffc3fc5e3a5391d3a489
SHA1454a6d749cf55ff990bd9f57941aca9d1f1674f6
SHA256f00bd6d3e7c7b8e8ad18b7dc6275fb80cc720fb164200a6506f50f6e66998b12
SHA5128147fa8014a5065f4fed7de1fbb9c2ee2c1b94d63596f7bbcf6821ecd41a73d25ebdfa1e71ca74d7598cba063042b6dfcaf050a23d0c855a7b6fbc94147ab41b