Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118.exe
-
Size
920KB
-
MD5
db5bd0b549a1e0dc10a0b54540c3dae8
-
SHA1
8cca8b1ede8559ccf92d320ffa0981f718d3c0b9
-
SHA256
bcedb469087380351644ae690537e78d337ab6a05cb6bf16d1ccbabad08425dd
-
SHA512
ebb2db8856d54fba6cbf4ab8fdabb0b7fc3a305b3b75772e89a0dcc1c4fd7a0bc7e74485dcf8e39e55141483008c519fb0fd457f873319f35360a7da09282d1d
-
SSDEEP
24576:tJXWAayET+QuawV+XTUknfiuG7weke8juowZKMnunK:WTzuaxjnsywKMnY
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3548 3852 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3852 db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db5bd0b549a1e0dc10a0b54540c3dae8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 5042⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3852 -ip 38521⤵PID:2536