Analysis
-
max time kernel
93s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 16:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d7e3682e60c4738765da9dc2a5ae49b4_JaffaCakes118.exe
Resource
win7-20241010-en
windows7-x64
2 signatures
150 seconds
General
-
Target
d7e3682e60c4738765da9dc2a5ae49b4_JaffaCakes118.exe
-
Size
294KB
-
MD5
d7e3682e60c4738765da9dc2a5ae49b4
-
SHA1
4c049992af07e568d379f226f3c4ff8ab89e5df5
-
SHA256
7362b0c2916cd24388afb61a9a1e19c034fb3d71f218fd7764f2601bb17fbd77
-
SHA512
7435e26a4ef4c9f37ae8ac59b26b42cbfe240e9191351228e07200968b508129334623368e803d4e66a8c97599c4d322aae1df1b63ef1136f35b6cd895d0d2b1
-
SSDEEP
6144:dUF4kPbZ0SOpA+iHqJL6hcqOOhxxdeTr/ekId:4jFO/BL6hcgzxd6LK
Malware Config
Extracted
Family
arkei
Botnet
Default
C2
boombangers00666999.sc/gate2233.php
Signatures
-
Arkei family
-
Program crash 1 IoCs
pid pid_target Process procid_target 3724 3252 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7e3682e60c4738765da9dc2a5ae49b4_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7e3682e60c4738765da9dc2a5ae49b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d7e3682e60c4738765da9dc2a5ae49b4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 5562⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3252 -ip 32521⤵PID:2368