Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
fab8d545f9d0069f1095d4c255fc7c94_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
fab8d545f9d0069f1095d4c255fc7c94_JaffaCakes118.exe
-
Size
669KB
-
MD5
fab8d545f9d0069f1095d4c255fc7c94
-
SHA1
8f7ae4957c28f718c3def7c78fe52824c2870ad2
-
SHA256
d4eaff6dd12f0f387f370a14181bd36e5fe43516ccda05ebc204e77050ec7880
-
SHA512
2631fd9d398999e8e42184a2097280b223fa079bde271cb7dc451b52bcd7991659f65211a2991f4e1e3513f7ea8c4876199909f4d4001ac30ca5863d8a318ca3
-
SSDEEP
12288:P5yYLWD0I9D66KcddYyQ9vw91Dm9glv3wXf2EG7A0diw5s1E7/c6saYeqQcY:ET0IgpcdZ8vUDLlTc67/c6+V
Malware Config
Extracted
vidar
41.2
916
https://mas.to/@serg4325
-
profile_id
916
Signatures
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/2684-2-0x0000000000D60000-0x0000000000E36000-memory.dmp family_vidar behavioral2/memory/2684-3-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral2/memory/2684-11-0x0000000000D60000-0x0000000000E36000-memory.dmp family_vidar behavioral2/memory/2684-12-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral2/memory/2684-10-0x0000000000400000-0x00000000008D7000-memory.dmp family_vidar -
Program crash 1 IoCs
pid pid_target Process procid_target 2116 2684 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fab8d545f9d0069f1095d4c255fc7c94_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fab8d545f9d0069f1095d4c255fc7c94_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fab8d545f9d0069f1095d4c255fc7c94_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 10322⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2684 -ip 26841⤵PID:4608