Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 00:09
Behavioral task
behavioral1
Sample
8e2f3088c8d290bcc97542f2cabc807c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e2f3088c8d290bcc97542f2cabc807c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8e2f3088c8d290bcc97542f2cabc807c_JaffaCakes118.exe
-
Size
205KB
-
MD5
8e2f3088c8d290bcc97542f2cabc807c
-
SHA1
c35a59018490ba1d3bf2bff97232221f7ba37544
-
SHA256
a04c8fbfae355c0d6f5b92b086aa90ed9986ae8ba9201e06085c97b6319ced1f
-
SHA512
cbe272b7e7dfca84a3b04c1f041cd4ac82f1d5708396406ccdf98cc9f9a65b526e56e07dd5b60b3b55db9fbd67e3080a139d4bc4f8a3db21aee5826af1ba600e
-
SSDEEP
3072:K0DpylZW0k8aJh6o3H7cQMACKVuerYK2sb7UXhFR3fKeP/q:RDH8c6oLymVKf/
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
resource yara_rule behavioral2/memory/3304-0-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3304-2-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 4976 3304 WerFault.exe 84 1124 3304 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e2f3088c8d290bcc97542f2cabc807c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e2f3088c8d290bcc97542f2cabc807c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e2f3088c8d290bcc97542f2cabc807c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 5042⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 5122⤵
- Program crash
PID:1124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3304 -ip 33041⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3304 -ip 33041⤵PID:2124