Analysis
-
max time kernel
111s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 00:09
Behavioral task
behavioral1
Sample
883b18b2a71b0d25604c635fad95a33b_JaffaCakes118.exe
Resource
win7-20240708-en
1 signatures
150 seconds
General
-
Target
883b18b2a71b0d25604c635fad95a33b_JaffaCakes118.exe
-
Size
230KB
-
MD5
883b18b2a71b0d25604c635fad95a33b
-
SHA1
134f8657fd0e84c738caa2d5d1c64480a51527e8
-
SHA256
67711f63ffd944000c885d09a46f9783fc971c22194447410c25ad1aa8a1b99e
-
SHA512
117460a9cbbd982c6ff925d0dc4de95e4ee03ae4d69c854c19294c876aa6b9d764f2ab8520960705aa3b556acbca023f10c65f8e9e2bc6d850b09fb8a03123a8
-
SSDEEP
6144:JydTYlHAsRdoSg0fNR6VxKeVEVlaja+tD3zOJvm:IdIAsRdoSJlMVx2Vlajaqzv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3548-0-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3136 3548 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 883b18b2a71b0d25604c635fad95a33b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\883b18b2a71b0d25604c635fad95a33b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\883b18b2a71b0d25604c635fad95a33b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 2002⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3548 -ip 35481⤵PID:3288