Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe
-
Size
974KB
-
MD5
b5debab45197f0ad1033243df26cff3a
-
SHA1
192e38c26983b18c7d3ee885a27971b36e771a08
-
SHA256
0ce8475353f07a0bf6fa201862b24cd9c5ba78699310ae8bec605e34bc6668c1
-
SHA512
990f81761f5e7f5429c9610d6fd99e788282477294fa6267b755149afafb6f69e8fc06e59bda9a9880c32509931e51b4f12496b94df1765ba6c4d214cb288129
-
SSDEEP
12288:Y1WpT9RlxLMh2gvhrC37UVjPEt/8+XIO27:JpHHwwOCYhMt/8bf7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1848 831786.exe -
Loads dropped DLL 4 IoCs
pid Process 1616 WerFault.exe 1616 WerFault.exe 1616 WerFault.exe 1616 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1616 1848 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 831786.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1848 2124 b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe 30 PID 2124 wrote to memory of 1848 2124 b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe 30 PID 2124 wrote to memory of 1848 2124 b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe 30 PID 2124 wrote to memory of 1848 2124 b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe 30 PID 1848 wrote to memory of 1616 1848 831786.exe 31 PID 1848 wrote to memory of 1616 1848 831786.exe 31 PID 1848 wrote to memory of 1616 1848 831786.exe 31 PID 1848 wrote to memory of 1616 1848 831786.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b5debab45197f0ad1033243df26cff3a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\831786.exeC:\Users\Admin\AppData\Local\Temp\831786.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 1323⤵
- Loads dropped DLL
- Program crash
PID:1616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5a03472ab671851f295b19565c5e81adf
SHA15ca7ea7328bbc8a718a03d691e3a133fbb7d576c
SHA25620c10b6e9791b2b463e2971488d4f44856131f90f82c7a109821d5e2f33ddd57
SHA51215d97318f72dea520164aefe7cf7663e8f2eef373811c734598180e34d135af62ca170b2f486e260c8b78c581f80fc5def547297387742b902d3a0b838ae2b2d