Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 02:35
Behavioral task
behavioral1
Sample
a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe
-
Size
124KB
-
MD5
a50e735727b96726987d54ea87baddd4
-
SHA1
d313aba601539d8747c488c6183fa095b6bc5bda
-
SHA256
dd91c369faf07b8ca84cbf9457a7c82b083b18be6d4b111fbde42f134d063f99
-
SHA512
f7160eff7c296802fff47c23acec0eb9bc8cc4979021b2d49803767c8cb06e2af0a1a51f988268aa8c5d797c59d997914da3e033ec2159ea9a0d0cbdfdc54e49
-
SSDEEP
768:qgz4cMUSoskidhu7XhZMLh4hN3fWzhsTAzflM6EndrdNIKviaILQ3:qtcEosVdhShZW8N3uzn9M6MdrdNR6xO
Malware Config
Extracted
purecrypter
https://store2.gofile.io/download/f3b14c59-13f8-41a4-ad34-9dd54fbba556/Djujwylniujperkjdiousa.dll
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2756 3008 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a50e735727b96726987d54ea87baddd4_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a50e735727b96726987d54ea87baddd4_JaffaCakes118.exedescription pid Process Token: SeDebugPrivilege 3008 a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a50e735727b96726987d54ea87baddd4_JaffaCakes118.exedescription pid Process procid_target PID 3008 wrote to memory of 2756 3008 a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2756 3008 a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2756 3008 a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2756 3008 a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a50e735727b96726987d54ea87baddd4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 11322⤵
- Program crash
PID:2756
-