Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
f9a6b0080b16e96ff1163a397de8dca8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9a6b0080b16e96ff1163a397de8dca8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f9a6b0080b16e96ff1163a397de8dca8_JaffaCakes118.exe
-
Size
228KB
-
MD5
f9a6b0080b16e96ff1163a397de8dca8
-
SHA1
1faebb7e024358812715ddc2cecae62599bc1c27
-
SHA256
1c686d70f524c5422dc6717e475557529cc3f88cb4a0464e93cb86e0f0f15197
-
SHA512
24ee5ca6af2feb4b3d7510a4ffd5b1d59d3bc5f7284e971cc05fb5b797fe77954bc816dd624f8c273763cae58b731f51e18b804b3a997e7b2a88091dba22e62d
-
SSDEEP
6144:braGDh4jLt4NVcWgyGELwXiS8T+bbhn7aRjS5ZgBbGc:CGWntWyD1LiS8lS5ZIN
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4568 540 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9a6b0080b16e96ff1163a397de8dca8_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 540 f9a6b0080b16e96ff1163a397de8dca8_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9a6b0080b16e96ff1163a397de8dca8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f9a6b0080b16e96ff1163a397de8dca8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 4682⤵
- Program crash
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 540 -ip 5401⤵PID:1404