Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe
-
Size
60KB
-
MD5
ef132d48150f6933688aa2554f6af59f
-
SHA1
3691d56d0cd53e864709fd9ee75031d145532a84
-
SHA256
39ba2222ee44c8e2faf1b307aaeee7d6e93c04ed9a2d2e3ffc5116104b541714
-
SHA512
bdc42c859a839f98a726d177e71feaab6f171511df8ba8ec302422eafaa351374aba31b4266b46b6081d546f5affcf79dcb896746cfd6acee120751c6337a8e7
-
SSDEEP
1536:L5scl1eH067BvmV7NMk91sZxr7OjD5rrrliCTdF:reFY+qD5rrxiCT
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2824 2716 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2716 ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2824 2716 ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe 29 PID 2716 wrote to memory of 2824 2716 ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe 29 PID 2716 wrote to memory of 2824 2716 ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe 29 PID 2716 wrote to memory of 2824 2716 ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef132d48150f6933688aa2554f6af59f_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 2202⤵
- Program crash
PID:2824
-