Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 23:11
Behavioral task
behavioral1
Sample
19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe
-
Size
75KB
-
MD5
19a12e04e9b30b9a6bed6b30cad145f9
-
SHA1
978e801ad7323badfdd1fe127f9fef3c5c9fece1
-
SHA256
eac07fa61a06748546fa9c98264d3089fffcf23ab4571356d8227a99edf7ff03
-
SHA512
e1a3a4255766173b6476a340361dcb75040855b8b65acce154ae7e4d4ef8c6b5391f181282f90656a76f8c631618d77ff6f2c629950fd3f03d11b8f562c06c36
-
SSDEEP
1536:9ZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAKtMqqU+2bbbAV2/S2LkvdG:hBounVyFHDMqqDL2/Lkvdcp
Malware Config
Signatures
-
GandCrab payload 1 IoCs
resource yara_rule behavioral1/memory/1284-0-0x000000000F070000-0x000000000F0869EC-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Program crash 1 IoCs
pid pid_target Process 1752 1284 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1752 1284 19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe 28 PID 1284 wrote to memory of 1752 1284 19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe 28 PID 1284 wrote to memory of 1752 1284 19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe 28 PID 1284 wrote to memory of 1752 1284 19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19a12e04e9b30b9a6bed6b30cad145f9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 1242⤵
- Program crash
PID:1752
-