Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 14:25

General

  • Target

    0e68969c64a3570c05269e68dcac334c_JaffaCakes118.exe

  • Size

    241KB

  • MD5

    0e68969c64a3570c05269e68dcac334c

  • SHA1

    d1aee2dbd006cbce3302f0be14c7ae5f475c2b2b

  • SHA256

    3565b5d5161d5a95998f34517659bc9a76fc087a8b2efd1b47d41b8db92fa041

  • SHA512

    8de483549e17b16e39894e1ad12537160e2808463ec06f750ad3d4b4fc9cd659a71311479afa56c6aa519c6c1b66ff97343ed4a6d1ee7b3cec30defb9585a4c7

  • SSDEEP

    6144:7ZXEOK99kX+ajTeLEre6/A5vCHToTOt6xYDjKv8UK23Ldtd/Va:7B+ajTLre6/AJcsOIxQDUKK5w

Score
7/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e68969c64a3570c05269e68dcac334c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e68969c64a3570c05269e68dcac334c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gcl1B3E.tmp

    Filesize

    172KB

    MD5

    685f1cbd4af30a1d0c25f252d399a666

    SHA1

    6a1b978f5e6150b88c8634146f1406ed97d2f134

    SHA256

    0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

    SHA512

    6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

  • memory/1996-0-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB

  • memory/1996-4-0x00000000002D0000-0x0000000000343000-memory.dmp

    Filesize

    460KB

  • memory/1996-5-0x00000000002D0000-0x0000000000343000-memory.dmp

    Filesize

    460KB

  • memory/1996-6-0x0000000010000000-0x0000000010012000-memory.dmp

    Filesize

    72KB