Analysis
-
max time kernel
147s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 09:48
Static task
static1
Behavioral task
behavioral1
Sample
b72cfecdb8f298ab1d5891459ba3c178_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b72cfecdb8f298ab1d5891459ba3c178_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b72cfecdb8f298ab1d5891459ba3c178_JaffaCakes118.exe
-
Size
24KB
-
MD5
b72cfecdb8f298ab1d5891459ba3c178
-
SHA1
7a73e9a651e850e86959736c030d5d58cf85ed1b
-
SHA256
7411537f33aee4393d4bbadcb1cb69df43a97e5a624105a6bf7e6e1fdf565f39
-
SHA512
790a4ac2cfdd97b44edf0f51ca76e05b774e3c21da1b485e48e7a38a30e647531a586131e40c9bee7d98569c3aba1eff2d5076190c5cc3951c50d5317ff91ac7
-
SSDEEP
48:fBhZYBGdCB9JM0UuXxJzN2FUL5Aw64Vkx0iL/k7As1gfSd:LZYRAmJxz904V5iAUs1gk
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 3232 4592 WerFault.exe 85 1712 4592 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b72cfecdb8f298ab1d5891459ba3c178_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b72cfecdb8f298ab1d5891459ba3c178_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b72cfecdb8f298ab1d5891459ba3c178_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 2602⤵
- Program crash
PID:3232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 2562⤵
- Program crash
PID:1712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4592 -ip 45921⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4592 -ip 45921⤵PID:4320