Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 09:44
Behavioral task
behavioral1
Sample
d1a477fb74e3e237afe9892469c79c44_JaffaCakes118.exe
Resource
win7-20240903-en
11 signatures
150 seconds
General
-
Target
d1a477fb74e3e237afe9892469c79c44_JaffaCakes118.exe
-
Size
328KB
-
MD5
d1a477fb74e3e237afe9892469c79c44
-
SHA1
c243d00ff335bdd380af3a83972da8428b890aca
-
SHA256
cb7f92b6fef74071d72d6fcbe19bc0839ee58948a667e0d5ad166b2f06388677
-
SHA512
5ba3324fa67338d6dbc5774d007b2d12c98af01eb6c5fcfa45ca298d71f827ee58211506a58c0f12c129a3f5bfa0300dfdb98b3619e629c920d142595549456e
-
SSDEEP
6144:Glico2wnMSny0XMWsiODopRj01d2LrtfT8:GS2UncWhpRjlLrtf
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/208-0-0x0000000000400000-0x000000000049B000-memory.dmp upx behavioral2/memory/208-2-0x0000000000400000-0x000000000049B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3496 208 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1a477fb74e3e237afe9892469c79c44_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1a477fb74e3e237afe9892469c79c44_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d1a477fb74e3e237afe9892469c79c44_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 4482⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 208 -ip 2081⤵PID:5028