Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
1155a605a136989296a35509c37eaa7d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1155a605a136989296a35509c37eaa7d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1155a605a136989296a35509c37eaa7d_JaffaCakes118.exe
-
Size
5KB
-
MD5
1155a605a136989296a35509c37eaa7d
-
SHA1
070b08ab69b2e0122905177c2ee53432b9fe080d
-
SHA256
446ba88b1f82f6ab6170238e08c4e4dfaf27c7d1b523e70fc1a2dc6116811319
-
SHA512
4e95ecbb011a782e9fc6b5923145f5fdb7906c26603560b4767984735d36207608211610c889bddcdebcce6d85604cacdd77325296d333927e8cdbbba345cfff
-
SSDEEP
96:RML/Jp0/J4RlhLXV7DMyuIkfrcNRi64zwKvdqtwdYKpJ7DEJkpddsHMhR:4JIJaxdw9uRi5kmdYiBDqRuR
Malware Config
Signatures
-
Program crash 2 IoCs
pid pid_target Process procid_target 4316 3836 WerFault.exe 81 4480 3836 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1155a605a136989296a35509c37eaa7d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1155a605a136989296a35509c37eaa7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1155a605a136989296a35509c37eaa7d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 2202⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 2242⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3836 -ip 38361⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3836 -ip 38361⤵PID:2184