Analysis
-
max time kernel
143s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe
-
Size
756KB
-
MD5
b7bd1016d59d6c20b3d3949f34168b2a
-
SHA1
afb7b90051ddfd53a5a7d601b176c45e4b096e09
-
SHA256
ca101e6e07e11c55434090e96fdb243ec1393af5f9ef4b37806269b721a90e7e
-
SHA512
201f7859249228762682f70e89ff9c426bbee4f582b134c738cb90233842ab2471962afdec83d78f78d9722980a0aeb5d6f60151e70c08f8107cedd08562b6a3
-
SSDEEP
12288:yNSUNjEf1kNMNVYBWvuI1Hmuok+P89u0HCme8UHlLUoBReOZjiHa8LwoG:yNSIjCmAYovSF09u0HCtNlLUyReOZOHw
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000800000001e550-14.dat acprotect -
Loads dropped DLL 5 IoCs
pid Process 3104 b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe 3104 b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe 3104 b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe 3104 b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe 3104 b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000800000001e550-14.dat upx behavioral2/memory/3104-19-0x0000000004140000-0x00000000041F6000-memory.dmp upx behavioral2/memory/3104-20-0x0000000004140000-0x00000000041F6000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe File created C:\Windows\SysWOW64\~GLH0001.TMP b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\plpl.dll b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\optplug.ini b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7bd1016d59d6c20b3d3949f34168b2a_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD5315f8d68ff1a414806e7344ac8dd8b6d
SHA18fe6719bdf12244e8ef154e36c77ec487dbafeff
SHA25690b9dfcb65f6e6cd0123f44cbf8310659f4c7ca4488a57d3045f72d55a9771e9
SHA51295a5efdaf8f620f85838be6eb59768a421059595c1e07dd6680aac3bfd371075f1c9528cb2dceefb333c72ed6821a6e592ca7d16e2923f39212a0e1ffdba296a
-
Filesize
33KB
MD5a6601202dda81c941e14dd79878ca61d
SHA1a436aa8bd1d6b501d30f01c4587fb32d513038f4
SHA2567906a8f868986edda9f7c4df0d93ed862959b81344a475f452b9e31c1aece464
SHA512c27d32541f21e0a5aa45939855d4cddfec04ec466a1231d419b29cf07157751bf778ef851868181a0392fbe6ddcabf372b7a2d35519b5b3a2bda21ff7192a5b4
-
Filesize
42B
MD5939041e8b853763b6f1412b9c9bf95e7
SHA1356301ec7c7542e4a4166f91d354e4ae4a46f888
SHA2569ad5eef59afcaecd2fda23d543cfc0af2840c196521820ab1e5df2b80417fad9
SHA512f63de821ddca56cb25ee3f71964d03ba61fa98bcc9d28559e1cd8ede00678a1cf17a1c0d6848f3faf1b3968ba5cc4d15c7c241b15a86f8f7caf017ba5ad3ae38
-
Filesize
271KB
MD58d1b9b39f397bff0167b4004b93dcb0c
SHA1f87393b8d8075653aeda32e8b8ba2997ba8d5fb1
SHA256ccc2ac3abf8e53d30c1d03f52c2a65b9810ec71fb616aac780f3226847f56f82
SHA512c0f99725514e91cd1edd64bc917355b17c2585d38c44855c3a3cd8258914d76ba59cbf5fb651b602fb45a2be5e3daedc56547012a4a5eab081c4a290b06d6ae2