Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
45190d0b2e425c53953b95e22c55bdab_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
45190d0b2e425c53953b95e22c55bdab_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
45190d0b2e425c53953b95e22c55bdab_JaffaCakes118.exe
-
Size
293KB
-
MD5
45190d0b2e425c53953b95e22c55bdab
-
SHA1
3277beca8d9eb413a5c9303be0d59957b14119ac
-
SHA256
3c97d2daf2e996d51ad031abf2cd4650873a244caafa1ac014ad260af9ffa67c
-
SHA512
990fae305b2024ea464a91df8355ea044c0b38b67b33ecd8cf7597dec20dbe3ce90b40434e107935850cd59706123ce2c3ccd322b52b43940c9b6bc666144b7f
-
SSDEEP
6144:yVQO8uZUEDqBJSVnKRBsYfJmrGaWhiNLpCNwBUMWnSoTg2:jUjsIVnKrsSPhUdQwBU/S32
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0004000000011ba2-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1152 45190d0b2e425c53953b95e22c55bdab_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1152 45190d0b2e425c53953b95e22c55bdab_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5b03c11b8021d7534e154345745797bb3
SHA18b44268028dccc13645b7ba585c3e7f50c382fe5
SHA256212138a7c24d2b2338a6f9f4464e55e92fc1ea90b283e610728b02ff728cc291
SHA512fa17c33f890d312833dd768210671b350509463be73d20b6890bd9713abfa08735cd12b084817d067755415e8b9b24b0ee409bfe772579ab118e25d0fb7610b0