Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe
-
Size
156KB
-
MD5
8cdff929bab8ce58a3672231cf07f4ce
-
SHA1
20bcf3186af4b701b99704f519afb28f176bfc1e
-
SHA256
509420504176caad5cea2fa0345278448a299eed959f85edf509572693acf58c
-
SHA512
805c5becc4cf3943dc47b08df1677b975bfe629c189e30d460c5c453bf9806342fa72556ceebb7c4b04e16f9670b12e0a4f93fa6a224951174add2e46d0290be
-
SSDEEP
3072:xANPhL3UsZtSxch3Z1C5GbWyleXkbxy6cg48Af4oQZiEHE:+PhwsZ5b1OGbU0NByhWa
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2688 2208 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2688 2208 8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2688 2208 8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2688 2208 8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2688 2208 8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8cdff929bab8ce58a3672231cf07f4ce_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1882⤵
- Program crash
PID:2688
-