Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
6fe6d4049a882039e87afe89773e8a8b_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
6fe6d4049a882039e87afe89773e8a8b_JaffaCakes118.exe
-
Size
601KB
-
MD5
6fe6d4049a882039e87afe89773e8a8b
-
SHA1
c6193076a56f88a12f4fa5c9dd4027bd6d28e6ef
-
SHA256
55f6eec5aa87955b8cbd85a4aa0a0827f8c2f6517687842b6c2a293395cb1f8e
-
SHA512
c4e7b30e09d23749b14efcdde39b28109dc33f5682f287b19b778a228496407e990465895e55a209b08404b8298fd3389d75c3e1cc4742d1121a3e216fb3632c
-
SSDEEP
12288:oGok/MGnfel9KYs5u7INZEg0mG9TvJTs9lIjSCCRp05Uf/4zlRkhQEqnP:DLnfel9qpZ9GRvmlIsTP/MxvnP
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000016d0c-4.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 1976 6fe6d4049a882039e87afe89773e8a8b_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0008000000016d0c-4.dat upx behavioral1/memory/1976-6-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1976-10-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1976 6fe6d4049a882039e87afe89773e8a8b_JaffaCakes118.exe 1976 6fe6d4049a882039e87afe89773e8a8b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1976 6fe6d4049a882039e87afe89773e8a8b_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD56aea0226a87d8d144963ab68b02009ac
SHA16dcc3d247ac8e872c8cfb7db73e1de1032fc6b11
SHA256ad7a6428108f2d01f2e1b747fc5f225fe7e32da7219c7df017a566566954b173
SHA512d171cb12715b1952d4f214780472668d57604e1f4efba798f1a84dab633ab39a95830ec80dee4a7abfa5969ea4d472f21f54d99ff480d02660c41e3f9489af4a