Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
d31905482a0755b37ecf1edd79f09fbe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d31905482a0755b37ecf1edd79f09fbe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d31905482a0755b37ecf1edd79f09fbe_JaffaCakes118.exe
-
Size
328KB
-
MD5
d31905482a0755b37ecf1edd79f09fbe
-
SHA1
77c26a4403ad97b4eb1ae76b0bbf0485bfd3ee00
-
SHA256
b0fbf9e08528edd1b889c7bc9796d028e7c8e7441543d2407ac019e6ab380d22
-
SHA512
c8d3bbb8f33abde8a5bfa9e3ab2521f35fbfcfab2314c7b4e4034255b768998de2be37cbfcd7091dbb1edc35eb4b787c624ebd87231eb4d2bc28a3bfc8eeedd5
-
SSDEEP
6144:yta0CwXo0v+9+wcE190ATsfc9p/aSJU4gdOaZHHPBaM3HmA4pdvuD:ytOuzv+e+5wOp/aSJJitR3HmVFuD
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2404 1912 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1912 2432 regsvr32.exe 28 PID 2432 wrote to memory of 1912 2432 regsvr32.exe 28 PID 2432 wrote to memory of 1912 2432 regsvr32.exe 28 PID 2432 wrote to memory of 1912 2432 regsvr32.exe 28 PID 2432 wrote to memory of 1912 2432 regsvr32.exe 28 PID 2432 wrote to memory of 1912 2432 regsvr32.exe 28 PID 2432 wrote to memory of 1912 2432 regsvr32.exe 28 PID 1912 wrote to memory of 2404 1912 regsvr32.exe 29 PID 1912 wrote to memory of 2404 1912 regsvr32.exe 29 PID 1912 wrote to memory of 2404 1912 regsvr32.exe 29 PID 1912 wrote to memory of 2404 1912 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d31905482a0755b37ecf1edd79f09fbe_JaffaCakes118.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d31905482a0755b37ecf1edd79f09fbe_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 2923⤵
- Program crash
PID:2404
-
-