Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe
-
Size
23KB
-
MD5
df07689e5ef86ee3cd35723253455c01
-
SHA1
0bfb0ae6db40f533db9f5ffd326ad25fc5464b79
-
SHA256
8205564366d52d01173be9cd201241aeb2300e6b8ed6fac07b058256e3c5c62c
-
SHA512
8fe813b0eea7cab1bc506bd3a53c28b50b4a5e0e9532fe80c9461bcd3e8ec6860304c8b00420f7d2078a1e9ee8f7f70a7029372abff74783bebb3d8b1e3289a3
-
SSDEEP
192:NXlODxDtgf4YFEh2abme8wnZPY4GU+9/CT3vmAJh7JWriWlhySd4/c1CgMS1Yp4z:ytguhFN8wnZwdVqXF0f/dic1CgMxs
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1144 set thread context of 3904 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 2496 3904 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1144 wrote to memory of 3904 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe 83 PID 1144 wrote to memory of 3904 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe 83 PID 1144 wrote to memory of 3904 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe 83 PID 1144 wrote to memory of 3904 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe 83 PID 1144 wrote to memory of 3904 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe 83 PID 1144 wrote to memory of 3904 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe 83 PID 1144 wrote to memory of 3904 1144 df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\df07689e5ef86ee3cd35723253455c01_JaffaCakes118.exe"2⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 2443⤵
- Program crash
PID:2496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3904 -ip 39041⤵PID:1420