Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 22:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe
Resource
win7-20241023-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe
-
Size
365KB
-
MD5
f0f1d182738e94a5e8a8b78a45bd0947
-
SHA1
ef158664f86472a86a0256ae1552221a19ea60ad
-
SHA256
f4ce835f1644ad798075acbd4229477cff4c3f17c328ef2fcea8719265328759
-
SHA512
3544c456c665fb797a09a24193cc1dcbebb7e7c93db3ae69396a46c4557f53564a8e52e55efe453a507ce0a43d47d3c106ecfdf167f6dd071ae9277258c968c2
-
SSDEEP
6144:FkJ2vr65Z+VkLzfgJb4GBbdddddddogBYXqSVJ7wjbrPBvIdblysg/j2AI+I9Nb7:FkxYyrYUGBbdddddddogaac+rPBvIdRt
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 848 2536 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2536 f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 848 2536 f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe 30 PID 2536 wrote to memory of 848 2536 f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe 30 PID 2536 wrote to memory of 848 2536 f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe 30 PID 2536 wrote to memory of 848 2536 f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f0f1d182738e94a5e8a8b78a45bd0947_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 2082⤵
- Program crash
PID:848
-