Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 00:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe
-
Size
107KB
-
MD5
ca29ff3eb553c5995a5cbb358e18fd20
-
SHA1
7a3f4cf9875cb230aea1575f117ed8c77000e511
-
SHA256
ec0e3f40d7c60b705623b9d743de671aeab07ffbca5ee7c4646d6e30fe8d7546
-
SHA512
e81a3c70a17ac7610df5ea056a56fb3e65fe51721dee8f2a962d840fc50ea4eca815b11fc5d07d2246cf32d555340ac1156131c7cb3e346f7e1866cacc53b5a0
-
SSDEEP
3072:U96xNOZ+EYq8klcPMxtoSzEphwPgKWE6HAj:U9uOdBjoSzEpYzEu
Malware Config
Extracted
Family
arkei
C2
95.181.157.6/G7yb65MmI9.php
Signatures
-
Arkei family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3612 set thread context of 556 3612 ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 2324 3612 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3612 wrote to memory of 556 3612 ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe 84 PID 3612 wrote to memory of 556 3612 ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe 84 PID 3612 wrote to memory of 556 3612 ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe 84 PID 3612 wrote to memory of 556 3612 ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe 84 PID 3612 wrote to memory of 556 3612 ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca29ff3eb553c5995a5cbb358e18fd20_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 2642⤵
- Program crash
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3612 -ip 36121⤵PID:2004