Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 07:46
Behavioral task
behavioral1
Sample
d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe
-
Size
24KB
-
MD5
d5e55caf452bd360fa54510813c925d0
-
SHA1
e65193d6e58db753a8ee0659667f7fa4fc3cfb2a
-
SHA256
3c3d0dc81994b22ae3435333c6573698f7038c256b44c8d5a5901f97a4395927
-
SHA512
5f0c37b4ce30d2241a2f70dc10df41ff20198131e3738e770020765fc116dfea4d83bcdb5ef0fbd89cb4a92d2484493cf0ffd3bbd382a5bfc0c4ccdc95704370
-
SSDEEP
768:WXu8WaCtFMJaUIg6vKGEqiiz47nbcuyD7UrD:6u8egJ6O7nouy8rD
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2416-13-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dsound.dll.259429631 d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\1007.ocx d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\1007.ocx d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ddr007.ocx d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\ddr007.ocx d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\New.dll d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\New.dll d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe File created C:\Windows\SysWOW64\dsound.dll.259429631 d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2164 2416 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2164 2416 d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2164 2416 d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2164 2416 d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe 28 PID 2416 wrote to memory of 2164 2416 d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5e55caf452bd360fa54510813c925d0_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 1242⤵
- Program crash
PID:2164
-