Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe
-
Size
203KB
-
MD5
ffc03a923c804e723d521433922fa2e6
-
SHA1
653cb9cf2e1d86c99699a86779216943f9b27b12
-
SHA256
0752b7235736c329dcb697d89025cda71f36ea342917f4a98269d314edc8acac
-
SHA512
0e69e89e3b3acf68ee713e8356fa84b3ed2da8545162f5d2c7a4430a2cf23d85ad766520188e0c2bec380accfad08e19d6e4410c0e4ac1947ae217467255638b
-
SSDEEP
3072:E2GrToU/Uw0f2l0OL0KNgI09+w/JfrzSvhylcdkmDWbHwUYd1eF:wrTvcyD09+w/JnSLSRYL
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000a0000000122f6-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 780 ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x000a0000000122f6-2.dat upx behavioral1/memory/780-4-0x0000000010000000-0x000000001000F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1712 780 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 780 ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe 780 ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe 780 ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 780 wrote to memory of 1712 780 ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe 31 PID 780 wrote to memory of 1712 780 ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe 31 PID 780 wrote to memory of 1712 780 ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe 31 PID 780 wrote to memory of 1712 780 ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffc03a923c804e723d521433922fa2e6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 2362⤵
- Program crash
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5a99800442d4a59acf5ef517f47d0618c
SHA120d57740ac72534415f22da8eb10aba9f40ad54b
SHA25678fa1dc90ab9d2eb038db54305b63768fb4332e867f3a6a05a30b502e658cac1
SHA5129d461182cc5dad6defad4a6d21963406c72b91daf88d734e2e8ac353610b83cafcd7d395e2bd8d642a6496da98d299a5a60fa9304d5ef618b629b181f45e0c46