Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
41a7a98dc38747530acfd910aaad34d2_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
41a7a98dc38747530acfd910aaad34d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41a7a98dc38747530acfd910aaad34d2_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
41a7a98dc38747530acfd910aaad34d2
-
SHA1
91c3d4d33b984535547b192d4c2228fa27179049
-
SHA256
cc7d0c9bd688601cffbbc41003a16ae4776e578c36e9c158b25d996259397e44
-
SHA512
0d4d5c4748c1a2ddc705401ee2e6bf9a1634765d3de4a4ea7d546a9e31cde6202100cc07e3c46f0007ff10c7b2bdea6db2fd384be70fdf35966692db32c0acc9
-
SSDEEP
49152:EaBLzGzEk/n1oOvDdftBpKiOwaCJd7Fe3:tlzGzEktoOvJftBkdTCH7Fe3
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a000000012248-1.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2044 41a7a98dc38747530acfd910aaad34d2_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2044 41a7a98dc38747530acfd910aaad34d2_JaffaCakes118.exe 2044 41a7a98dc38747530acfd910aaad34d2_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9