Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
74f67a9da0429c43687513bcb93f18d1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74f67a9da0429c43687513bcb93f18d1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
74f67a9da0429c43687513bcb93f18d1_JaffaCakes118.exe
-
Size
24KB
-
MD5
74f67a9da0429c43687513bcb93f18d1
-
SHA1
d6cdd1ead736392ccdd247ad86bbdbe6497ecf60
-
SHA256
017a93f20e63da110fcb79df9341dc2a2b077ffcdc620ef7447d80b498301fc2
-
SHA512
8c5653f4b8e7ae5ab55d4ce0f870516f56e02328ac1977c7d4f5e906c1c3ff5d74afc45a8f749d5e2fe9796794e4f345532c589808c89a93a504becf8ef20c4b
-
SSDEEP
768:sSui003l8E5/kUUFd3Tk6LICar06OJYfVKPWu:buitH57UTA6LICS06O6fVy
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3340 4444 WerFault.exe 83 1084 4444 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74f67a9da0429c43687513bcb93f18d1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f67a9da0429c43687513bcb93f18d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\74f67a9da0429c43687513bcb93f18d1_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 2562⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 2842⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4444 -ip 44441⤵PID:2232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4444 -ip 44441⤵PID:1748