Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 02:04
Behavioral task
behavioral1
Sample
f9824d5b2100e3eebad1b584bf294060_JaffaCakes118.exe
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
f9824d5b2100e3eebad1b584bf294060_JaffaCakes118.exe
-
Size
63KB
-
MD5
f9824d5b2100e3eebad1b584bf294060
-
SHA1
e76ad68451101749bd077e1ddce04f0aa7043fc0
-
SHA256
e4c39ddf4f8ccd43ba01f863c9b63d5c976f4d4a462c6ae3f866e87c8fdbf0d7
-
SHA512
dd5a55ffb76b49093bef7085523f5212ec22b2d0d5ccab8ea66eff3b18af03b66bb9b56f3f0551e746effe7558924cf2a206d2c5e61d2b4a3fb021791bc60c0a
-
SSDEEP
1536:PukGHSkYNk+Pnl/18JXHhUVhC7GltJAhNX2IB6fO34esu:P9GDwk+Pnl/18JXHhUVhYzBYOoeB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2204-0-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4620 2204 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9824d5b2100e3eebad1b584bf294060_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2204 f9824d5b2100e3eebad1b584bf294060_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9824d5b2100e3eebad1b584bf294060_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9824d5b2100e3eebad1b584bf294060_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 2682⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2204 -ip 22041⤵PID:872