Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 12:41
Behavioral task
behavioral1
Sample
b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe
-
Size
193KB
-
MD5
b37e01b84ec08805a43a5ad9c8c0dc8d
-
SHA1
49d97f4a96fc3ead2d540d5f19bed353b9863519
-
SHA256
c8a3d4502c6593920fef04c43616591f9e069eb7ab2c81b22f891f02984d615f
-
SHA512
2ad0c0ab89afc1cd3d16f39a99c69611b11b73333e38da68c53304d5236603907b124a530f17b94ae86d6120a8c7ea618540d45d7e4351c7d17f028e04601530
-
SSDEEP
3072:3Qhsz8yfX+++L+++++++lntMJknzaHENgN:hz14knOL
Malware Config
Extracted
purecrypter
https://store2.gofile.io/download/9a64ecfe-2a9c-4436-a721-97bdc2f9a011/Hohimqtxnmjeugfaetqslao.dll
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2432 2152 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2152 b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2432 2152 b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2432 2152 b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2432 2152 b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe 32 PID 2152 wrote to memory of 2432 2152 b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b37e01b84ec08805a43a5ad9c8c0dc8d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 11242⤵
- Program crash
PID:2432
-