Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 09:38
Behavioral task
behavioral1
Sample
958b9617fd3bf15fdaa3880afe38ec3f_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
958b9617fd3bf15fdaa3880afe38ec3f_JaffaCakes118.exe
-
Size
707KB
-
MD5
958b9617fd3bf15fdaa3880afe38ec3f
-
SHA1
cd244f1f021d599f3390708d54c93ad565c75562
-
SHA256
78f210740c5d8ad83a55b90c6a5dfc0345ad5298b56a756e80d06f206f885620
-
SHA512
877fb11654edbe920d85399bd09fb0025fa77c2c481ab2d537b01e11eaad4838e509e0d3ba0e952a41d2d7d7be5fb5d24ddc8942ff96a4d7341656182c1c05ee
-
SSDEEP
6144:yknN4CVUIm6uk06ZLYgvBA+8xmrxgmA+3cclptVopAN:HnNhuBoY8SorxgmA+nlvVl
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3596-0-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral2/memory/3596-1-0x0000000000400000-0x000000000050A000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3596-1-0x0000000000400000-0x000000000050A000-memory.dmp autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3184 3596 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 958b9617fd3bf15fdaa3880afe38ec3f_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\958b9617fd3bf15fdaa3880afe38ec3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\958b9617fd3bf15fdaa3880afe38ec3f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 2242⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3596 -ip 35961⤵PID:3528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4360,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:81⤵PID:3536