Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
708c4903d2c9b814e171ecbb6b4075c4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
708c4903d2c9b814e171ecbb6b4075c4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
708c4903d2c9b814e171ecbb6b4075c4_JaffaCakes118.exe
-
Size
661KB
-
MD5
708c4903d2c9b814e171ecbb6b4075c4
-
SHA1
aa20541b3f767ec23352416ff6c47677faa7b4d6
-
SHA256
555d7f01b87389276190df857d26594c8ce3d8c956cc647f60cdce0723c5b8df
-
SHA512
8ff7f15003016933cb05e92caf680905dbd601b70e4f8855897e64403b77d4598af8b7ddf734b77294edd5843acee61d13d6e7b6dffd2327b4de78606f16235f
-
SSDEEP
12288:T0X/a1CSNDOQEauFRaOmiTLGXMpSAWvLFBVUw72x:A6vlqaFOVGpjVU9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3204 4436 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 708c4903d2c9b814e171ecbb6b4075c4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4436 708c4903d2c9b814e171ecbb6b4075c4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\708c4903d2c9b814e171ecbb6b4075c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\708c4903d2c9b814e171ecbb6b4075c4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 4642⤵
- Program crash
PID:3204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4436 -ip 44361⤵PID:5068