Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 01:01
General
-
Target
c7f6856eb1a11f16b1dfece13b8a635a_JaffaCakes118.exe
-
Size
53KB
-
MD5
c7f6856eb1a11f16b1dfece13b8a635a
-
SHA1
b30fd4c8469ae45473679a7a0c5e92e1a2012bc2
-
SHA256
f27d8e4de7d4f55881817b1f8d5cd2b1a5dfc3d2c0dbbb9528563eefebbd0768
-
SHA512
9eef542fb2933aba7493904793b40d720082c0288f3073972c22cb2e31ea777eff94e6f6c83f2d71eef67328c0c3314dfddbc45bf9c52041396ef44d928afff2
-
SSDEEP
1536:ghEpAV+k1T2waTu7vkDZFH11V534Jy7L30GK:gsHk1Qu7v819Hw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2052-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral1/memory/2052-3-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2444 2052 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7f6856eb1a11f16b1dfece13b8a635a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7f6856eb1a11f16b1dfece13b8a635a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7f6856eb1a11f16b1dfece13b8a635a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 3402⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2052 -ip 20521⤵PID:4024