Overview
overview
7Static
static
3845f1b46e6...18.exe
windows7-x64
7845f1b46e6...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/HeroCodec.exe
windows7-x64
7$TEMP/HeroCodec.exe
windows10-2004-x64
3Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
845f1b46e6e45938558e3d53232e0b19_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
845f1b46e6e45938558e3d53232e0b19_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$TEMP/HeroCodec.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/HeroCodec.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240802-en
General
-
Target
$TEMP/HeroCodec.exe
-
Size
35KB
-
MD5
5999ff5aee628079742cbc0b75613448
-
SHA1
fca38ce425fa4fa3e2e0afcf7b6450e47d75b24f
-
SHA256
5b7b62843740e9c9380663c39eb68e61e63e9f833eff33823edbd193b6901cef
-
SHA512
7f8bb4496f1622e490d3290c03e7797c8f9b461f3290e635afeacdf5a00842b324ce9bbe8b87f1c5da9047caab79f817af9468cd8e91c85858fc86cf8f0b6b90
-
SSDEEP
768:FZPgggBVwUVxRO9VcMjt+7M/0fg4roLRxh+4uZ:FTWVLq9Vrjt+osY4robh+4W
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 5016 4952 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HeroCodec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\HeroCodec.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\HeroCodec.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 3922⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4952 -ip 49521⤵PID:1048