Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
001ca0716c497f39750039483e66799b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
001ca0716c497f39750039483e66799b_JaffaCakes118.exe
-
Size
376KB
-
MD5
001ca0716c497f39750039483e66799b
-
SHA1
f5d667b0cb37166a82e93dda82e69926befe34cf
-
SHA256
6827828bcef17dd2f3dc29a8e37bb324c807ad28cbcc6bff873399eaa65e5dbd
-
SHA512
958d5ea0c9222aeb53462f7aaf77d8d8b4ad6e8d60a3621f63bca21b9921cb0ea4fcdaa91214b59495502302d8c15dd626d1c5a97ef72ebd84a34d1e99db38f9
-
SSDEEP
6144:6l5rxCfagKqZmUAGNLTBXpSqGRY5wALXqo1jmUZxL6xQGQW8w:6zNCfagKqZmUAsLTnGu3LXqs76l5
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0009000000023368-5.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2872 yl_fuck.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 452 3588 WerFault.exe 80 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 001ca0716c497f39750039483e66799b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yl_fuck.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3588 wrote to memory of 2872 3588 001ca0716c497f39750039483e66799b_JaffaCakes118.exe 81 PID 3588 wrote to memory of 2872 3588 001ca0716c497f39750039483e66799b_JaffaCakes118.exe 81 PID 3588 wrote to memory of 2872 3588 001ca0716c497f39750039483e66799b_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\001ca0716c497f39750039483e66799b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\001ca0716c497f39750039483e66799b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\yl_fuck.exeC:\Users\Admin\AppData\Local\Temp\yl_fuck.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 5322⤵
- Program crash
PID:452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3588 -ip 35881⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5fbf37911b3960af01edce84345d2909c
SHA1fc2e7fc4093c9bc693a73748f65cdae2f87ebf1a
SHA2566b5433a2ec878fc100acb0f2d5107d0764395e5a0d71eb6ef3146b742736380f
SHA5120c45119591097f4395a1fa48a358e4b8ec5f446dbe06b2a1c495aeaf378a78d4b21d3c6a189b6c805279a69c7924e05b03366b20b69ca268cbfda91574ff7e4c