Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 08:52
Static task
static1
Behavioral task
behavioral1
Sample
1702f6936db859d43d1afe6a02d2379b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
1702f6936db859d43d1afe6a02d2379b_JaffaCakes118.exe
-
Size
649KB
-
MD5
1702f6936db859d43d1afe6a02d2379b
-
SHA1
95e2c44699c52017f6fa8852770a902e5ea8c302
-
SHA256
1bb0d91de807006c381c2552a64f0e02c9b856332cea226e48c86099c8bd953c
-
SHA512
15c049de654a24c4c26fd6bb156858e6489f05d7a163c1151285c64cfc34d83fa68b41b5ad14a617d1eb4750e6437eabb5cc930092c9870a36d54d9450f2cf21
-
SSDEEP
12288:Ib9BK7Qpc+13ntyP96yrfIwD/I8LDZObXRymS0gyw68pmuD8akYHN:sXmQpFJyEv0ZOb8mHF8zkYHN
Malware Config
Extracted
vidar
40
916
https://lenak513.tumblr.com/
-
profile_id
916
Signatures
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/1776-2-0x0000000000AA0000-0x0000000000B3D000-memory.dmp family_vidar behavioral2/memory/1776-3-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/1776-14-0x0000000000AA0000-0x0000000000B3D000-memory.dmp family_vidar behavioral2/memory/1776-15-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/1776-13-0x0000000000400000-0x0000000000958000-memory.dmp family_vidar -
Program crash 1 IoCs
pid pid_target Process procid_target 1864 1776 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1702f6936db859d43d1afe6a02d2379b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1702f6936db859d43d1afe6a02d2379b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1702f6936db859d43d1afe6a02d2379b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 16322⤵
- Program crash
PID:1864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1776 -ip 17761⤵PID:2336