Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
8929bfb85eea5e6e532bcc17a4174070_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
8929bfb85eea5e6e532bcc17a4174070_JaffaCakes118.exe
-
Size
140KB
-
MD5
8929bfb85eea5e6e532bcc17a4174070
-
SHA1
c9e10f7ad73ce4b2b99c44dc3111e3354dd64c96
-
SHA256
6dab805f4a72d5bd6666ccd38d1d75a238a891ebbd51dd9c34735f20e1125963
-
SHA512
b633e29f9f769fa5535abc8b0f49a7a3ce906bbb52db34a763e8a784d0006d9b248e90881b321033088e52a83e55e495cd75245851fb636c19c3480dcb28f749
-
SSDEEP
1536:I3AHT5p8OHtm8vsMnxyg/2ghfSV273H7FkgPWz0qTz+8asX1GxKVLpGXnjsdy6xW:I3k8hNgZ6QH7+gPWzDStEBVLGGy6s
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000e000000023352-3.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2800 8929bfb85eea5e6e532bcc17a4174070_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000e000000023352-3.dat upx behavioral2/memory/2800-7-0x0000000075910000-0x000000007594C000-memory.dmp upx behavioral2/memory/2800-8-0x0000000075910000-0x000000007594C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8929bfb85eea5e6e532bcc17a4174070_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD51e7380266e607976ee5a3aebae96a063
SHA1ef9089af98d033ba9cf05812af03518ce016639c
SHA25657b3a74b73c786df941412814a366f05572a1efb0723b0cca18667401baf35ca
SHA5129df348bf5ebe263257da9b75dba283baba6855dab5533f94897c28ecd2673bbfad0dde2a10e6cbe74d607fb76b7139b0846afc4e429d4a1570503c26f517ce85