Analysis
-
max time kernel
91s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 09:40
Behavioral task
behavioral1
Sample
2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe
Resource
win7-20240729-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe
-
Size
360KB
-
MD5
2edb218d169029eb8ed0382e390268e4
-
SHA1
8a08bd90f52bdb5b846491500caef69a7f9bd31b
-
SHA256
76abdce013457f38c013a20ef0b681e4ce7916e554beff0710e7403bd35772e8
-
SHA512
3f4a0a4ef100f7d8e709f102056b1f0f2b3ad68d88456754ae06e7f1e427244d8dbfb49dd701a2af5995091dc82f1d9dacc1e6ceabb4c1791360fa02a406e44c
-
SSDEEP
6144:KTnjnvrM3mjHGh5Doh9Z5cAea4Jv81E67tpwXD1pXWfA:KHn438Hwerea2vEEH/XWfA
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2748-0-0x0000000000400000-0x00000000004BA000-memory.dmp upx behavioral1/memory/2748-1-0x0000000000400000-0x00000000004BA000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2532 2748 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2532 2748 2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2532 2748 2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2532 2748 2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe 30 PID 2748 wrote to memory of 2532 2748 2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2edb218d169029eb8ed0382e390268e4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 2042⤵
- Program crash
PID:2532
-