Analysis
-
max time kernel
134s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 04:42
Behavioral task
behavioral1
Sample
c83cd29501cbb669604efafee4062e3c_JaffaCakes118.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
c83cd29501cbb669604efafee4062e3c_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
c83cd29501cbb669604efafee4062e3c
-
SHA1
d06d57bc7dbb91e5c6ba9643e85d85ae4fed5837
-
SHA256
af6a1f6f60c7187a5540a54d7997acda937224cff2bd492692326b1a5aebb1ff
-
SHA512
ae4032e4dd03f579062f7e7675a79cc593532c3dd8ea187ddaf2472088bdcdddd91706335519fdebde399dba1242a2512174ae6f6df7ce256d5e93e2a7f73885
-
SSDEEP
24576:V563ey8gZqj4y1Asahs9SX9MSuTrJlW+93ww0+ei21o3v:H/+qEy1AE9MuTf/gw0+rv
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c83cd29501cbb669604efafee4062e3c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate c83cd29501cbb669604efafee4062e3c_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/624-0-0x0000000000400000-0x000000000070C000-memory.dmp upx behavioral2/memory/624-11-0x0000000000400000-0x000000000070C000-memory.dmp upx -
Program crash 8 IoCs
pid pid_target Process procid_target 4408 624 WerFault.exe 83 3612 624 WerFault.exe 83 4876 624 WerFault.exe 83 2776 624 WerFault.exe 83 4008 624 WerFault.exe 83 1644 624 WerFault.exe 83 2496 624 WerFault.exe 83 5064 624 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c83cd29501cbb669604efafee4062e3c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c83cd29501cbb669604efafee4062e3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c83cd29501cbb669604efafee4062e3c_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 5402⤵
- Program crash
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 6002⤵
- Program crash
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 7922⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 8322⤵
- Program crash
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 8322⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 6602⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 9322⤵
- Program crash
PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 10402⤵
- Program crash
PID:5064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 624 -ip 6241⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 624 -ip 6241⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 624 -ip 6241⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 624 -ip 6241⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 624 -ip 6241⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 624 -ip 6241⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 624 -ip 6241⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 624 -ip 6241⤵PID:720