Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe
-
Size
875KB
-
MD5
390d4aa93b388ad008ffdaf806b1a95c
-
SHA1
f2c6933b0136fb9c91aa3333da77e1ad5a9d8357
-
SHA256
b4a800a83fc781eef191caf98d118726a85d91c61d1a8e8e815bdcd2c1c43e53
-
SHA512
cd275f846ff63c2e2a4bfe4153f82c979b98c01e265f4fa70000193d3e86b8d03aea6a544752f5b3283f5434c7c09806d93a79e0b964bc4f31c4b73a01fff223
-
SSDEEP
24576:UANd8pxgnm/3YF0bNrAFgLRnxcAs3r9H5m:U86pxgnm/31prAFgdps3ZH5m
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000f000000023a69-10.dat acprotect behavioral2/memory/548-13-0x0000000074F20000-0x0000000074F2A000-memory.dmp acprotect behavioral2/memory/548-94-0x0000000074F20000-0x0000000074F2A000-memory.dmp acprotect -
Loads dropped DLL 16 IoCs
pid Process 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000f000000023a69-10.dat upx behavioral2/memory/548-13-0x0000000074F20000-0x0000000074F2A000-memory.dmp upx behavioral2/memory/548-94-0x0000000074F20000-0x0000000074F2A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe 548 390d4aa93b388ad008ffdaf806b1a95c_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD555788069d3fa4e1daf80f3339fa86fe2
SHA1d64e05c1879a92d5a8f9ff2fd2f1a53e1a53ae96
SHA256d6e429a063adf637f4d19d4e2eb094d9ff27382b21a1f6dccf9284afb5ff8c7f
SHA512d3b1eec76e571b657df444c59c48cad73a58d1a10ff463ce9f3acd07acce17d589c3396ad5bdb94da585da08d422d863ffe1de11f64298329455f6d8ee320616
-
Filesize
9KB
MD50a99211080937fbe34c9a2c145c2e6ea
SHA13860576dd35eb583a6e650d4503c7753c2212328
SHA256e9cde2a690d8a6b5039340e2d93d0364a6d2ac338e7161ebb205e64b78189458
SHA512242e40a8cfc85b0a1efa2af5a97c60334a8ac1b72c955e5882e75e70d0b91ef5d0aa4b641e226876e88b840664259a33552bff775c7b2656f14cca2f71f02675
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
3KB
MD5c43953f463c22e048e45b402d190e77d
SHA1b4a5e6567bed3c783af030df9418f91a7bac3040
SHA2564e2a7c511e0f2ef46ac9002e0666f058ea5a4657371f086e2e4797393ee2fbf2
SHA51218facd89f3dc55826b7aa0c02b8fdf3a1e6741850e4d9c264fb095e9da7956f6a4d331655ef00862948397d1a3f99d15243d03ef09c145a39c3b9a0c2ef4c974
-
Filesize
172KB
MD58777f46e35ab035d4b526377d9a7097b
SHA19780ff9145be4aa7a912e6dbaaf7d781316b9adb
SHA256d5bb2ebaac75a1588f00cea3d35faea0e5a3c7c319785406315cda2d4a52bb47
SHA512131d6d9de492d55dc55df396a5153119bcb1c09c723abf009d8a7ef3cc71244b51f7ac1715bf7bc23c9b94ac661c255cd7a30e97267295ce060487705395128c
-
Filesize
59KB
MD5c6731fd774db4835a5763afd404a50eb
SHA1c6b20b36631b513ca8647d952b95469b77d2ac24
SHA25623861a8828cedc363baa54760766c01fdd9e1414073ca1148ff9a19ca818b13a
SHA512c3eca3f693f4ff6b078e0708c70156f2184708f0e07d40f3cd54dd24556ae6e010a89b9bfb777f4131f0d0ee0f87d79015e7eb8f0b2606fa156d846dd581e197
-
Filesize
6KB
MD57b42ce0bb387ae8a452136da404bf6b0
SHA11d9a116d55be1beb0089e392d5ae342e2bffa8a4
SHA256af19101a9303306e7bb8c3ddb7f1174e43b9b8ef969e78b504545ed6afe42fb7
SHA512c50d4a172af361d2978d4204afb712581ffe558950b775e8f0a9fa29e6e8d2076e603fae5417358dceee30c4d4906d8d2dfb4879028818f0f303b8c21f2f6032
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
60KB
MD5ae97029e01393cb7ba395504c49d9fe2
SHA1247b4e1b4100b8ba426fe8957b9de3f32b1bbaee
SHA256eff23a5d372e18b5647ab812e7600eaa84a893ce64f72c96e02592b96f93866b
SHA5125bdb06feeeb8ec51a760e804678ed9d67b7622466b40004d6ff4304d6e3e2b5c3dd6a377ce71a025b5658865f826c97069219c0a763ba28ba01d0127949fbc51