Analysis Overview
SHA256
c9980200b6140c26be3e053c741c0258681fb7ededf817b14a73ff6256ede5c5
Threat Level: Shows suspicious behavior
The file 04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118 was found to be: Shows suspicious behavior.
Malicious Activity Summary
ACProtect 1.3x - 1.4x DLL software
Loads dropped DLL
UPX packed file
ASPack v2.12-2.42
Drops file in System32 directory
Unsigned PE
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-06-23 23:40
Signatures
ASPack v2.12-2.42
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-23 23:40
Reported
2024-06-23 23:43
Platform
win10v2004-20240508-en
Max time kernel
51s
Max time network
55s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\unzip32.dll | C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe"
Network
Files
memory/3264-2-0x0000000000910000-0x0000000000911000-memory.dmp
memory/3264-1-0x0000000000400000-0x0000000000493000-memory.dmp
memory/3264-7-0x0000000000400000-0x0000000000493000-memory.dmp
memory/3264-0-0x0000000000400000-0x0000000000493000-memory.dmp
C:\Windows\SysWOW64\unzip32.dll
| MD5 | 149fb14b5e190f0d1936b083690a14dd |
| SHA1 | 4dcb940918438f0b0225128e99d8534689566294 |
| SHA256 | 562296b32e06bf45a402051e00f1e8a3381f079880b1dc34c6c56b188cc9f4a3 |
| SHA512 | d6ee05d76199ca3ab15e409eedea8bf783614a375349f8260c5d0a33e9b97861cb8f7984d76d1aa21fa557448e267f1cd38a00bd558682e935ad211180cf02ea |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-23 23:40
Reported
2024-06-23 23:43
Platform
win7-20240419-en
Max time kernel
121s
Max time network
122s
Command Line
Signatures
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\unzip32.dll | C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\04715ed8bb54677fd5d24a70002d77c3_JaffaCakes118.exe"
Network
Files
memory/1200-0-0x0000000000400000-0x0000000000493000-memory.dmp
\Windows\SysWOW64\unzip32.dll
| MD5 | 149fb14b5e190f0d1936b083690a14dd |
| SHA1 | 4dcb940918438f0b0225128e99d8534689566294 |
| SHA256 | 562296b32e06bf45a402051e00f1e8a3381f079880b1dc34c6c56b188cc9f4a3 |
| SHA512 | d6ee05d76199ca3ab15e409eedea8bf783614a375349f8260c5d0a33e9b97861cb8f7984d76d1aa21fa557448e267f1cd38a00bd558682e935ad211180cf02ea |
memory/1200-5-0x0000000010000000-0x000000001001C000-memory.dmp
memory/1200-6-0x0000000000400000-0x0000000000493000-memory.dmp