Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe
-
Size
130KB
-
MD5
13dbd742b2371fcf2f376b766884cf90
-
SHA1
1b80b8cb8539230dd79fa8b2b06682f1d35619f8
-
SHA256
018daa8d49e1da3ac6fb63580367e2f43b1d6f056705f5b17679918f2665f43c
-
SHA512
51ca485430f888b0b8ed2b866d4e74fffe27db866f70af7eda9f2cc6ecfcc8c2f3e4e0b4a8464a24ecad920b3ba07cda8f402312d00c25e7791e8509771a73e0
-
SSDEEP
3072:MTLD5gEuKqLsO8nUrWqhjjjjjjjjjYxmsMyi7JR:Y5RDqLonrxms
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2408 1724 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1724 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe 30 PID 1920 wrote to memory of 1724 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe 30 PID 1920 wrote to memory of 1724 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe 30 PID 1920 wrote to memory of 1724 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe 30 PID 1920 wrote to memory of 1724 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe 30 PID 1920 wrote to memory of 1724 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe 30 PID 1920 wrote to memory of 1724 1920 13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe 30 PID 1724 wrote to memory of 2408 1724 svchost.exe 31 PID 1724 wrote to memory of 2408 1724 svchost.exe 31 PID 1724 wrote to memory of 2408 1724 svchost.exe 31 PID 1724 wrote to memory of 2408 1724 svchost.exe 31 PID 1724 wrote to memory of 2408 1724 svchost.exe 31 PID 1724 wrote to memory of 2408 1724 svchost.exe 31 PID 1724 wrote to memory of 2408 1724 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\13dbd742b2371fcf2f376b766884cf90_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 2523⤵
- Program crash
PID:2408
-
-