Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
856f37b66548f9b13fe3cc519028edc2_JaffaCakes118.exe
Resource
win7-20240708-en
12 signatures
150 seconds
General
-
Target
856f37b66548f9b13fe3cc519028edc2_JaffaCakes118.exe
-
Size
102KB
-
MD5
856f37b66548f9b13fe3cc519028edc2
-
SHA1
5c0cf650461f16319f44656b9d322f6f60443fef
-
SHA256
b820e0788f2afc001ba80ba7b27f5fae7c5f3f67aa4d2a9de5c08d40969f00e6
-
SHA512
d25b3a2571ee2b8f20be8098f7a6f2aa22113039b3be6d96079b432a7fa0e64e02564ff2d7b6e95279bb1299dc444767dcf2d36d8c345003217271135f113a51
-
SSDEEP
3072:Oni53sWSyd2X1pivnYjJiYATxkBdJMFGCpRN:j3sDU2XjiwjJiYASBdqFGCPN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4016-1-0x0000000002190000-0x00000000021F2000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 212 4016 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 856f37b66548f9b13fe3cc519028edc2_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\856f37b66548f9b13fe3cc519028edc2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\856f37b66548f9b13fe3cc519028edc2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 33322⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4016 -ip 40161⤵PID:5100