Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe
-
Size
271KB
-
MD5
ce7eba6b39295176c95ca4d07d7ec948
-
SHA1
d7d7f509fea7b92c0dc641f199b8e3bd8c7ae544
-
SHA256
6608162e09f1ba371b6d534d353a1a025acef016e3af8d4c29955bb200da6bf7
-
SHA512
b921acc612a8fa0677f4a64ea90b77316defd35c3b3d90f45958e7516414c0aef62fbbe73f86a39ab96c0ca2f1457138e77ee86f77162ebac3571bb1b10da64b
-
SSDEEP
6144:11vD5CywCAfJ6uR3oRC8S1Px3Etk+ET+juV6bXe85jspKmun:11vgxNMuRYMPuECjZrb1spKD
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2380 2168 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe 2168 ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2380 2168 ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2380 2168 ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2380 2168 ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe 30 PID 2168 wrote to memory of 2380 2168 ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce7eba6b39295176c95ca4d07d7ec948_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 2962⤵
- Program crash
PID:2380
-