Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 01:23
Behavioral task
behavioral1
Sample
b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe
-
Size
350KB
-
MD5
b9d0c7143f46c68108d7bf6f6172ffec
-
SHA1
1308d14ab10e212c0bb7e4036218e7e55e9b3de1
-
SHA256
eb0984b46c22d2178ca79148680db2a79f7a6fe8772a90ff991075f3fb42db6d
-
SHA512
795442a37c5c743d9bd91353acf70b07ece8bd0e1b58d5e3b11e5d9e0618c33b7a3bb8ed215f504f0c77856ff6322e6512237826fcde4b580ea638ca6ebfc709
-
SSDEEP
6144:jIG+vg3HSSOCkhwXLg9W/J6Mt8VifcfK5l56Vf3hof73Qn22PoTs91gz/r+YN3:0bvg3kCe6foMt8ibbqf3uTguTy1+yS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2976-0-0x0000000000400000-0x0000000000505000-memory.dmp upx behavioral1/memory/2976-1-0x0000000000400000-0x0000000000505000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3044 2976 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3044 2976 b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe 30 PID 2976 wrote to memory of 3044 2976 b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe 30 PID 2976 wrote to memory of 3044 2976 b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe 30 PID 2976 wrote to memory of 3044 2976 b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9d0c7143f46c68108d7bf6f6172ffec_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 362⤵
- Program crash
PID:3044
-