Analysis

  • max time kernel
    94s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:15

General

  • Target

    b4f0fb5efa1bfb836ae5828a9ed7ecb8_JaffaCakes118.exe

  • Size

    181KB

  • MD5

    b4f0fb5efa1bfb836ae5828a9ed7ecb8

  • SHA1

    f3a5422d18a87577619447398525e1480aff2870

  • SHA256

    5e3d8dc24dc9b6d62f8cb88f85a3fd781842ee48c739ec243f20c382ef3e97cf

  • SHA512

    dbe5bb7ce4da6ad37e5efa50dbb6f543001f0f71e1e76a2243381d42efc23538168ca3f23cd6af0b9484187d4f4b0df0fda945a402e1815bb85ff76f1ad89b84

  • SSDEEP

    3072:AlUGRG26pGXrEpvc83lxiB7TvsxIFoAIFwiF1jjjQ1rh+qtljCRrW2n6KsxDpj38:EsSEpZ3LyTvseF7UwiFh4h+qD4nfsxDK

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4f0fb5efa1bfb836ae5828a9ed7ecb8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b4f0fb5efa1bfb836ae5828a9ed7ecb8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3324
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 224
      2⤵
      • Program crash
      PID:3156
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 264
      2⤵
      • Program crash
      PID:4180
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3324 -ip 3324
    1⤵
      PID:3976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3324 -ip 3324
      1⤵
        PID:4424

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3324-0-0x0000000000400000-0x000000000049F000-memory.dmp

        Filesize

        636KB

      • memory/3324-1-0x0000000000400000-0x000000000049F000-memory.dmp

        Filesize

        636KB