Analysis
-
max time kernel
142s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
f09771b2200cfcc54242e1fb9b5c22ea_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f09771b2200cfcc54242e1fb9b5c22ea_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f09771b2200cfcc54242e1fb9b5c22ea_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
f09771b2200cfcc54242e1fb9b5c22ea
-
SHA1
fa46803c650b92ef4849004124c7b13200d3379a
-
SHA256
9fd042002a32f492be703ed3f8a47f348053dfc31ab9d99bde3d0750bb0f943f
-
SHA512
417eab48d624dace57ccdafdd5bcf1811df0e4e2e1083183ea3e7fe0a0a2e53cffe6ae40a3a2c24fc03cffb01d5239342819db9fa5c30d34e67d4c05f5180809
-
SSDEEP
49152:Kr3qtuHaqcWb2v4uTKLvve4DCf94Ui0tfDq5rsKCqvZ41ABuDzt9dDZmmyW:KrM71i2AsKLvW4mZxO5ZLINDJ97mw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4036-0-0x0000000000400000-0x0000000000638000-memory.dmp upx behavioral2/memory/4036-2-0x0000000000400000-0x0000000000638000-memory.dmp upx behavioral2/memory/4036-4-0x0000000000400000-0x0000000000638000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 4048 4036 WerFault.exe 84 2756 4036 WerFault.exe 84 1884 4036 WerFault.exe 84 316 4036 WerFault.exe 84 2024 4036 WerFault.exe 84 3588 4036 WerFault.exe 84 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4036 f09771b2200cfcc54242e1fb9b5c22ea_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f09771b2200cfcc54242e1fb9b5c22ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f09771b2200cfcc54242e1fb9b5c22ea_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 7402⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 7682⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 14002⤵
- Program crash
PID:1884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 14202⤵
- Program crash
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 13762⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 14282⤵
- Program crash
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4036 -ip 40361⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4036 -ip 40361⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4036 -ip 40361⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4036 -ip 40361⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4036 -ip 40361⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4036 -ip 40361⤵PID:4056