Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 14:57
Behavioral task
behavioral1
Sample
956a768208ff48981465018d86d3c592_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
956a768208ff48981465018d86d3c592_JaffaCakes118.exe
-
Size
15KB
-
MD5
956a768208ff48981465018d86d3c592
-
SHA1
a4ec75f3ae2ab4c5880faefcd3b7c78bb906aa2f
-
SHA256
8d9f9bd5bfebfd5ca156a898cc21240d767aea11c8943d34760b05bdff586387
-
SHA512
9f69e1eeed79687e14ca674ff2dc7d82e08648e6e726ad3779fc9f0d576ba4bb4eec05803f3fe377b5e71705178aa5c191430ff56239f60499ddda88eeb33656
-
SSDEEP
192:IGVSJrJf+Bm72P4WOnefWRjyShQSPDSFa/rtKI89Wo7rFysFMIT:pYdh+BeSON2ShQSPDSUzth8957rFviI
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/874247640320204820/3B1X1K91RjBXiE1hDnhrKls4Ih9fE6Ge_n0uYQTa2cOY8SZ1MifX9KsVxzk4U4MVBNnJ
-
payload_url
https://cdn.discordapp.com/attachments/858108963778199552/872458910047559681/savedecoder.exe
Signatures
-
Growtopia family
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2172 2068 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
956a768208ff48981465018d86d3c592_JaffaCakes118.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 956a768208ff48981465018d86d3c592_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
956a768208ff48981465018d86d3c592_JaffaCakes118.exedescription pid Process procid_target PID 2068 wrote to memory of 2172 2068 956a768208ff48981465018d86d3c592_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2172 2068 956a768208ff48981465018d86d3c592_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2172 2068 956a768208ff48981465018d86d3c592_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2172 2068 956a768208ff48981465018d86d3c592_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\956a768208ff48981465018d86d3c592_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\956a768208ff48981465018d86d3c592_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 6322⤵
- Program crash
PID:2172
-