Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 15:27
Behavioral task
behavioral1
Sample
JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe
-
Size
188KB
-
MD5
64cad5c3b41140569e181de5099a641d
-
SHA1
7b6f23d7087ebfccebd5168bdf11f39be865e61d
-
SHA256
0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb
-
SHA512
2ab52a2f0be784e50543f4a83cc0a6253afc2ed3db413fd36e4063ffe93ab6a9f126462d46e728888b005701045bf44af4507ea8d89c2b840be2299a121c7709
-
SSDEEP
3072:B41o1td/cV0wviRixgwxBsxWVybxY/qS8Jp1kdqq5SzNJ3M/8r2bazndTSGs0XZt:B9F2pxswzCS6/kwq5PkCbazdT3HX+K/
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1916 1704 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1916 1704 JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe 30 PID 1704 wrote to memory of 1916 1704 JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe 30 PID 1704 wrote to memory of 1916 1704 JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe 30 PID 1704 wrote to memory of 1916 1704 JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0d139063d149682b14c0ed09cece49b33cb04d88f9fca3608fb7d92ca99d08fb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 362⤵
- Program crash
PID:1916
-