Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 01:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6cab9279a64c2edca47abe2b78768ad2_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
6cab9279a64c2edca47abe2b78768ad2_JaffaCakes118.exe
-
Size
543KB
-
MD5
6cab9279a64c2edca47abe2b78768ad2
-
SHA1
c1e1033a00d0d4c2fb8916209ea05dc6710b49ea
-
SHA256
396e1a6e5031132f59ebe847a7d672aabcc2b4ad5228a3862b2cfc97387bdf14
-
SHA512
0c9ff8bebadf36ff85040a19f93e1525c730d6602e831580e850fa81737743d43718bece9ac2de60e88f3fdac1ba2ed3063bcdf68bcc1a0d7f65f0546ce52bee
-
SSDEEP
12288:VKxuI4KuuNwrwuMBYPxYrQABF8/hELaUPO7i:zhKrS0YJY8U8+rKi
Malware Config
Extracted
Family
vidar
Version
40
Botnet
933
C2
https://lenak513.tumblr.com/
Attributes
-
profile_id
933
Signatures
-
Vidar Stealer 5 IoCs
resource yara_rule behavioral2/memory/5068-2-0x0000000002F60000-0x0000000002FFD000-memory.dmp family_vidar behavioral2/memory/5068-3-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/5068-15-0x0000000000400000-0x00000000004A1000-memory.dmp family_vidar behavioral2/memory/5068-14-0x0000000002F60000-0x0000000002FFD000-memory.dmp family_vidar behavioral2/memory/5068-13-0x0000000000400000-0x0000000002CBE000-memory.dmp family_vidar -
Program crash 17 IoCs
pid pid_target Process procid_target 3752 5068 WerFault.exe 85 532 5068 WerFault.exe 85 3544 5068 WerFault.exe 85 976 5068 WerFault.exe 85 4996 5068 WerFault.exe 85 4384 5068 WerFault.exe 85 4680 5068 WerFault.exe 85 2484 5068 WerFault.exe 85 1400 5068 WerFault.exe 85 4708 5068 WerFault.exe 85 4832 5068 WerFault.exe 85 2740 5068 WerFault.exe 85 3688 5068 WerFault.exe 85 2592 5068 WerFault.exe 85 1300 5068 WerFault.exe 85 2532 5068 WerFault.exe 85 2156 5068 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cab9279a64c2edca47abe2b78768ad2_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cab9279a64c2edca47abe2b78768ad2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6cab9279a64c2edca47abe2b78768ad2_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 8082⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 8242⤵
- Program crash
PID:532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 8522⤵
- Program crash
PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 9002⤵
- Program crash
PID:976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 9842⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 9882⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 11042⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 15122⤵
- Program crash
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 15802⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 17922⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 15962⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 15402⤵
- Program crash
PID:2740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 15802⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 15762⤵
- Program crash
PID:2592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 16202⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 16482⤵
- Program crash
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 18042⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5068 -ip 50681⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5068 -ip 50681⤵PID:992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5068 -ip 50681⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5068 -ip 50681⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5068 -ip 50681⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5068 -ip 50681⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5068 -ip 50681⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5068 -ip 50681⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5068 -ip 50681⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5068 -ip 50681⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5068 -ip 50681⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5068 -ip 50681⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5068 -ip 50681⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5068 -ip 50681⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5068 -ip 50681⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5068 -ip 50681⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5068 -ip 50681⤵PID:2056