Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe
-
Size
9KB
-
MD5
b1cb3e03b2254c4889c5fd142df08b5e
-
SHA1
56c93c45bea7636d6371a7fed63339f5438406f5
-
SHA256
2340a13fc0f8ce9d8033241121f663e30549ca28e20b404de48338bb9db67cca
-
SHA512
8419906af2ae2917912a3a50a8d2eea03046562b750c5d7f32d17cdc5cd0a46486a74774bd68d280bf0eaa970e48d1439509f7703b388327d1897c2feb9ee96e
-
SSDEEP
192:TqIjFrci6qqScKsP23W1FWmeVi5AYtXHP1oyn3vcD:WIj9V6qqScKsu3WQYB1Bvc
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\12121212.ini b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1804 2252 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1804 2252 b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe 30 PID 2252 wrote to memory of 1804 2252 b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe 30 PID 2252 wrote to memory of 1804 2252 b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe 30 PID 2252 wrote to memory of 1804 2252 b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b1cb3e03b2254c4889c5fd142df08b5e_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 2082⤵
- Program crash
PID:1804
-