Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11-07-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
371ac71304cb874b5ecab7e49a00f1e2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
371ac71304cb874b5ecab7e49a00f1e2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
371ac71304cb874b5ecab7e49a00f1e2_JaffaCakes118.exe
-
Size
187KB
-
MD5
371ac71304cb874b5ecab7e49a00f1e2
-
SHA1
4779e6cb8e369e78d9f2d0da80975826e482793f
-
SHA256
6c19ce395919346839a2e31a020df75322701a4ee2ded20df01d1e8717bcbce3
-
SHA512
1f7225b5ed11502fca8564afa80d6c65d77d031e2386fcd0f36db6a2d4871ee6c84417f8aea0214a29da3dcc2b4e40ad9fc899fdef478a58125393c66fa0ba48
-
SSDEEP
3072:jWuN7ZW5ZHz7FDkfHfz2ZqP7ZLxNxAHlR5gxWP5/MfQtG1chdRkEHwI52IjQVlNb:jJ3W5Fz7F+Hr2cP1dNxA2xWhUQG1Yd7C
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00080000000120ff-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2520 371ac71304cb874b5ecab7e49a00f1e2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2520 371ac71304cb874b5ecab7e49a00f1e2_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9