Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe
-
Size
119KB
-
MD5
dc43fc123c5fa191865ed40a297cfe1e
-
SHA1
5e7089fb00b1deee7ffbd6466d37b96bebd441a3
-
SHA256
693d155a6572953ac4f276c98e8c55a762f0948852b37f02b1b9bce343363d20
-
SHA512
ad438ee8e22d2d95c45b42a8afa4fd564a20960e06d7c659249f78b233c29842dd9febc5f74189f5850ef887ec942a696a56338945599fe992a06e11235f7970
-
SSDEEP
1536:ZIbT1l+40FVyvefmZwBhWeDbLDhXBkm6+dyZ65bpY1zF5C+b1HdgqsY7QqrgwF:ZI/2dqcBh1Tkyws5bpY1R5Ci/gVqrg6
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2080 2036 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2080 2036 dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe 31 PID 2036 wrote to memory of 2080 2036 dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe 31 PID 2036 wrote to memory of 2080 2036 dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe 31 PID 2036 wrote to memory of 2080 2036 dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc43fc123c5fa191865ed40a297cfe1e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 1482⤵
- Program crash
PID:2080
-