Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe
-
Size
36KB
-
MD5
fcc186b9f7df28a427601d02b43f0f15
-
SHA1
9792490ffc15e0578971623174a42e961de5cd2e
-
SHA256
945f6cc8ceb3cc764e7b8e3825b372e814a4dc6d2ce65c48498b4dca5a1365ca
-
SHA512
677457ded4a2321428919ba52e182aaac21d5d59cb23ba5d383f3a08124248d1cf154b0f36ffb5f1ee4cbbfee3e93a172cdaf2fea59feb042c2ddb7e09acdf0b
-
SSDEEP
768:2HoRlhSItHgPd7evpE0HVBG+ZWpCic/+cj1DWRjQB:2E+ygd8qMVBGAWNmRd1
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4904 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4904 set thread context of 4704 4904 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 81 PID 4704 set thread context of 4228 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3944 4228 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4704 4904 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 81 PID 4904 wrote to memory of 4704 4904 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 81 PID 4904 wrote to memory of 4704 4904 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 81 PID 4904 wrote to memory of 4704 4904 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 81 PID 4904 wrote to memory of 4704 4904 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 81 PID 4904 wrote to memory of 4704 4904 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 81 PID 4704 wrote to memory of 1812 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 82 PID 4704 wrote to memory of 1812 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 82 PID 4704 wrote to memory of 1812 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 82 PID 4704 wrote to memory of 4228 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 83 PID 4704 wrote to memory of 4228 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 83 PID 4704 wrote to memory of 4228 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 83 PID 4704 wrote to memory of 4228 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 83 PID 4704 wrote to memory of 4228 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 83 PID 4704 wrote to memory of 4228 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 83 PID 4704 wrote to memory of 4228 4704 fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe3⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fcc186b9f7df28a427601d02b43f0f15_JaffaCakes118.exe3⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 2364⤵
- Program crash
PID:3944
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4228 -ip 42281⤵PID:3476