Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 18:25
Behavioral task
behavioral1
Sample
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
-
Size
733KB
-
MD5
e31e48662574f7d126ce9f34270a5798
-
SHA1
3febe03da0c9b11564a19e7712480b57824c15d0
-
SHA256
39133c4007c2cb44673d950bf599f0d0ed399adda1ebda2796845fe658653dbb
-
SHA512
92e48e39559bb042765d9decf7ec83e8cb807ef7d25ff0955f7d6b595edb536ee7430722d3fb895b9f8e790346595d2a7d443ee45d0aae66fb16a7184c3f78a9
-
SSDEEP
12288:NqzcpVgUXzL0TTUKZHTNloEkOpnKgofuIwV6eAj0SZxxXMcEen3paPcg:NqzcpKIL0TvZzNlNky0wVW0SZxJVg
Malware Config
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4756 3944 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e31e48662574f7d126ce9f34270a5798_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 5402⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3944 -ip 39441⤵PID:1056