Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe
-
Size
425KB
-
MD5
41ae44518f69a7c7fc697488bc830c05
-
SHA1
7e94c49802b83d0cdc6bc6ab15a31602591807f0
-
SHA256
19b0527f4e2dad34c7096c59fb13cec7182d5865f3b2337137935ee6df02c415
-
SHA512
0f327776191ff58501a3df7371d4f60088fc222a7896e23557965b27b1a61676f544b34436ac94ad6309970af0ea7a0942c97da9ebfeeeeb53223004e2c9191b
-
SSDEEP
6144:HzpcDLVByPtp75tWyziZRS8k+0heD4pw73WTFE8Io673P8ALsUB3QBHPomIz+r2D:HNSXyP/fW7ZtkdjwE4iZHQ9yr2f7
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2692 1072 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2692 1072 41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2692 1072 41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2692 1072 41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe 30 PID 1072 wrote to memory of 2692 1072 41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41ae44518f69a7c7fc697488bc830c05_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 882⤵
- Program crash
PID:2692
-