Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 17:05
Behavioral task
behavioral1
Sample
c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe
-
Size
184KB
-
MD5
c13036184d485f8d732ac04903948dc3
-
SHA1
39746f4230c2190da861e7e9ad499681da58b36b
-
SHA256
8e6336abede8f53fea75ff344d5d670b554349bd39bed806df7b092d7b5d98f9
-
SHA512
db20c56511e9312a49c6acc959196225cf943940e22652b795ebe5e7f61de4ee00f0f8ccf5bba7c6b33eed45c5a84db3f90d100d062a9ca90ad57805bd7239cb
-
SSDEEP
1536:EOC0FvV4OguHxjhpA4Bm7uW0vSUsghQevBFkutIbgTuFqKRr0aF5frleGhd9TfBR:EwV4OgSzBmh04eZFkz3Rr0gwGj9Tf8rG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1368-0-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1368-1-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2316 1368 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2316 1368 c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2316 1368 c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2316 1368 c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe 28 PID 1368 wrote to memory of 2316 1368 c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c13036184d485f8d732ac04903948dc3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 882⤵
- Program crash
PID:2316
-