Analysis
-
max time kernel
138s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 04:28
Behavioral task
behavioral1
Sample
88fdfc6098bcfcaa46a87e299d156f30_JaffaCakes118.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
88fdfc6098bcfcaa46a87e299d156f30_JaffaCakes118.exe
-
Size
183KB
-
MD5
88fdfc6098bcfcaa46a87e299d156f30
-
SHA1
c86ba4d21b28f1ac86dd1712f7769af766b446a0
-
SHA256
f21cd3b59ebcc6ee0b0e5de51fdd477e691971d8b25a93475ff8d243ed55ffb8
-
SHA512
242b54e83c3afe813ff33859a3d99ed54eed123d42ccee43adf017949f6ea2c564af1e5bff6759ca02d94db9423baaea3f902704d86bbbdd1284d9b254c51d33
-
SSDEEP
1536:bOC0FvV4OguHxjhpA4Bm7uW0vSUsghQevBFkutIbgTuFqKRr0aF5frleGhd9TfBi:bwV4OgSzBmh04eZFkz3Rr0gwGj9Tf8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2784-0-0x0000000000400000-0x0000000000475000-memory.dmp upx behavioral2/memory/2784-2-0x0000000000400000-0x0000000000475000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 1132 2784 WerFault.exe 84 4428 2784 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88fdfc6098bcfcaa46a87e299d156f30_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88fdfc6098bcfcaa46a87e299d156f30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88fdfc6098bcfcaa46a87e299d156f30_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 2602⤵
- Program crash
PID:1132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 2842⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2784 -ip 27841⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2784 -ip 27841⤵PID:2528