Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe
-
Size
180KB
-
MD5
ea0fef57ee26486cbc47261d1a582be7
-
SHA1
ffbd421b49e9039acf1183eaab63ac4c62a2308f
-
SHA256
c4a1cde2dc1613ee79823b4db600b3153be30714757328f6c44a9b89090a2ec8
-
SHA512
1ab79d99164609d17494f8e7a1dca8f095a62f5512d8918a29073874b9405bd6adfa2d93f192b2d71581e63ed303675a3edc9b042c6212b0235b318dbd4d6eb6
-
SSDEEP
3072:xh2auTA+QrAeLk0rbOu2Hp9S1QAbZq0c4h4fWFCWfPgUy0bc/2hqumJohc:xh4n3XHpgQWq0c4+fcCwpy0b1Iu
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2672 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2700 2672 ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2700 2672 ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2700 2672 ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe 30 PID 2672 wrote to memory of 2700 2672 ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea0fef57ee26486cbc47261d1a582be7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 1162⤵
- Program crash
PID:2700
-