Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 17:41
Behavioral task
behavioral1
Sample
436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe
-
Size
16KB
-
MD5
436650a1bbb56e51675ab5ada3ab7dcb
-
SHA1
f962644ca978d07b69738065d6ebcac698093b84
-
SHA256
0637a4eb05e7aa5be209fcdb7e327d6f391aa759914a92bfdc009c0dc72dd713
-
SHA512
ebabee9b5718cdf60f2dee7ddb8b1ee98f1a4ed631f34e408f644d96007f3d829c70dcef20e84b8756bae3771d9ea75de36ea1e3f72be04d67d025d32d54b918
-
SSDEEP
384:Kk/jNwurf9RgfeJTqNuz7HjkWqYj0HDmow9LOREM0:X/jRrTkeJT8uz7HjkMj0HDmow9LOO
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2032-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2032-1-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2100 2032 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2100 2032 436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2100 2032 436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2100 2032 436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2100 2032 436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\436650a1bbb56e51675ab5ada3ab7dcb_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 882⤵
- Program crash
PID:2100
-