Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 00:23
Behavioral task
behavioral1
Sample
5e4f782eeaddeddf2adbfec3421403a3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e4f782eeaddeddf2adbfec3421403a3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$TEMP/RZ6x19pV.dll
Resource
win10v2004-20240709-en
General
-
Target
5e4f782eeaddeddf2adbfec3421403a3_JaffaCakes118.exe
-
Size
102KB
-
MD5
5e4f782eeaddeddf2adbfec3421403a3
-
SHA1
d703e3e784b6de5204aa6fd30acd8dfa2ead6b04
-
SHA256
7786da73d4cbd1da94605b9e887de962cac0e2b1996f1d0e43bc422214286bcb
-
SHA512
c44a9c26cc3f2b26deeaa6d588e7e4cc64ac64cf8697551e0496b2ec8bfe3e5548314ae18aa4556a508c3f48f3e691b7e779be74637412a86c8b017a23543c0d
-
SSDEEP
3072:IgXdZt9P6D3XJbCfHc7La7XTvjMq53CzFWcnO:Ie344PcXYLgqwRWcO
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a0000000233f6-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2116 rundll32.exe -
resource yara_rule behavioral2/files/0x000a0000000233f6-2.dat upx behavioral2/memory/2116-4-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4916 2116 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3340 wrote to memory of 2116 3340 5e4f782eeaddeddf2adbfec3421403a3_JaffaCakes118.exe 84 PID 3340 wrote to memory of 2116 3340 5e4f782eeaddeddf2adbfec3421403a3_JaffaCakes118.exe 84 PID 3340 wrote to memory of 2116 3340 5e4f782eeaddeddf2adbfec3421403a3_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e4f782eeaddeddf2adbfec3421403a3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5e4f782eeaddeddf2adbfec3421403a3_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\RZ6x19pV.dll",Install C:\Users\Admin\AppData\Local\Temp\RZ6x19pV2⤵
- Loads dropped DLL
PID:2116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 5763⤵
- Program crash
PID:4916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2116 -ip 21161⤵PID:3104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5f6df0c1ed00d1c1a3a2976ba832765d6
SHA1315b1a41b0e6328543e6cd31ab114fd144aecdbb
SHA256b38ba468cb301b7cb3db3262ebdbfc045c485a0bb2947d59461cba198900f24e
SHA5127850224f293943a0476e2d8ce3082f93881dbbc107d482ec655ea5f1b4f73b208361fe7422e2b99c7980bc6774ead4813e43eb3e1e0cd34868817a993cab5d75