Analysis
-
max time kernel
95s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 05:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cec8471b6afb7ce7ef8de4f4ffa9fcf4_JaffaCakes118.exe
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
cec8471b6afb7ce7ef8de4f4ffa9fcf4_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
cec8471b6afb7ce7ef8de4f4ffa9fcf4
-
SHA1
51aa0560eced9f0ce9871bab8dcfa03724b99183
-
SHA256
bf78d1e18d6740b7caa9d2c907093e7187be9e3bee73c81a271fb8564732941d
-
SHA512
e824764078bd9f36dae8ddc2046921e025005b1968c0a83861f47fc21c059bb52553e4df7a4b3c9d8c1ff520848a0ae053a2332a4c73cbe3bc95f8f027acb221
-
SSDEEP
24576:yiPLQ29u26fkQz3qimHWnmEpicRBdwiN1HDFKTKR2XfFKd/0+/uUaLjI:pPU0QfkQLq1PAjRciNGGR2vF6/p/enI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1448-1-0x0000000000400000-0x0000000000653000-memory.dmp upx behavioral2/memory/1448-2-0x0000000000400000-0x0000000000653000-memory.dmp upx behavioral2/memory/1448-3-0x0000000000400000-0x0000000000653000-memory.dmp upx behavioral2/memory/1448-4-0x0000000000400000-0x0000000000653000-memory.dmp upx -
Program crash 8 IoCs
pid pid_target Process procid_target 4472 1448 WerFault.exe 82 4400 1448 WerFault.exe 82 1400 1448 WerFault.exe 82 3192 1448 WerFault.exe 82 628 1448 WerFault.exe 82 976 1448 WerFault.exe 82 2680 1448 WerFault.exe 82 1212 1448 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cec8471b6afb7ce7ef8de4f4ffa9fcf4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1448 cec8471b6afb7ce7ef8de4f4ffa9fcf4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cec8471b6afb7ce7ef8de4f4ffa9fcf4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cec8471b6afb7ce7ef8de4f4ffa9fcf4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 8562⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 8762⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 8762⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 9442⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 10002⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 11562⤵
- Program crash
PID:976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 12122⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 12242⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1448 -ip 14481⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1448 -ip 14481⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1448 -ip 14481⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1448 -ip 14481⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1448 -ip 14481⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1448 -ip 14481⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1448 -ip 14481⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1448 -ip 14481⤵PID:4952