Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 18:25
Behavioral task
behavioral1
Sample
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
-
Size
733KB
-
MD5
e31e48662574f7d126ce9f34270a5798
-
SHA1
3febe03da0c9b11564a19e7712480b57824c15d0
-
SHA256
39133c4007c2cb44673d950bf599f0d0ed399adda1ebda2796845fe658653dbb
-
SHA512
92e48e39559bb042765d9decf7ec83e8cb807ef7d25ff0955f7d6b595edb536ee7430722d3fb895b9f8e790346595d2a7d443ee45d0aae66fb16a7184c3f78a9
-
SSDEEP
12288:NqzcpVgUXzL0TTUKZHTNloEkOpnKgofuIwV6eAj0SZxxXMcEen3paPcg:NqzcpKIL0TvZzNlNky0wVW0SZxJVg
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2964 1656 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2964 1656 e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe 29 PID 1656 wrote to memory of 2964 1656 e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe 29 PID 1656 wrote to memory of 2964 1656 e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe 29 PID 1656 wrote to memory of 2964 1656 e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 2322⤵
- Program crash
PID:2964
-