Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe
-
Size
96KB
-
MD5
25fc52e5a99a2cc15fac45ca7aed9310
-
SHA1
d82e30b8b6bbb96712a7d9ed5c905ed8317e871e
-
SHA256
cebd2466a2d5b03121cea1d9e2fc73995e61ab54cd694b8830868f87efc224ac
-
SHA512
a47ba0b6da5ce0153c544942b2bf002758698e07c49e8406bd9bf25540f4704209930a33874f11e443a2d7c69fd9ec147c418ff5f270c43c0901ee859f5a054c
-
SSDEEP
1536:eZgEhTX5YtQAClaA2rY/GHH/Zgw6Xo5MKDysXYWGSofXzb8s6OwI8UPx:2LQQAClag+HfS3XMMSyJWxo/zVZx
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2308 2548 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2548 2160 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 30 PID 2548 wrote to memory of 2308 2548 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2308 2548 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2308 2548 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2308 2548 25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25fc52e5a99a2cc15fac45ca7aed9310_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 443⤵
- Program crash
PID:2308
-
-