Analysis
-
max time kernel
142s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 05:49
Behavioral task
behavioral1
Sample
2f3041237f0402b5d6084dab4e2016fb_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
2f3041237f0402b5d6084dab4e2016fb_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
2f3041237f0402b5d6084dab4e2016fb
-
SHA1
de4c5364ad06d5392e483a3f3933e16ca8975a44
-
SHA256
8cf86f9ae585cce08b16ba6367a0ac2cd1b54a59716a4d30d9f3f58e7a18af0f
-
SHA512
08a232b2c38b4874ffc5343d477e7a23cdd9b1901102034ee0611fa119189404788f3b4a4c390a7ab2d3a41ad20cf1e242af24feee6bd911054e6d4fb2998d5e
-
SSDEEP
49152:dTxxgM4q1hrfUjffc9L+7r6XqfumaWOelWRjgxFIPgwD5:dTxSMVw89L+7rnfZaWr2jgrigw1
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023384-10.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 3008 2f3041237f0402b5d6084dab4e2016fb_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x0008000000023384-10.dat upx behavioral2/memory/3008-11-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral2/memory/3008-20-0x0000000010000000-0x000000001003D000-memory.dmp upx -
resource yara_rule behavioral2/memory/3008-0-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-2-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-12-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-13-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-14-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-15-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-16-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-17-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-18-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect behavioral2/memory/3008-19-0x0000000000400000-0x000000000081C000-memory.dmp vmprotect -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3008 2f3041237f0402b5d6084dab4e2016fb_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3008 2f3041237f0402b5d6084dab4e2016fb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3008 2f3041237f0402b5d6084dab4e2016fb_JaffaCakes118.exe 3008 2f3041237f0402b5d6084dab4e2016fb_JaffaCakes118.exe 3008 2f3041237f0402b5d6084dab4e2016fb_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5147127382e001f495d1842ee7a9e7912
SHA192d1ed56032183c75d4b57d7ce30b1c4ae11dc9b
SHA256edf679c02ea2e170e67ab20dfc18558e2bfb4ee5d59eceeaea4b1ad1a626c3cc
SHA51297f5ae90a1bbacfe39b9e0f2954c24f9896cc9dca9d14364c438862996f3bbc04a4aa515742fccb3679d222c1302f5bb40c7eaddd6b5859d2d6ef79490243a4d