Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 16:23
Behavioral task
behavioral1
Sample
JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe
-
Size
188KB
-
MD5
04ecab4dae42f8db8a8336f79a820c00
-
SHA1
0bd4f9214bc5a49ba47384b105b5829db11b1171
-
SHA256
ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973
-
SHA512
e3c1286317a09f608c502ade7e0ade0dc7e4476509c5fd777af342769c4fcd8a423f34d542835773e770433d0b32aa9676e15bfe806cbd57605836aaa2428144
-
SSDEEP
3072:Xh4eHi0WR9VdNj1NWIt+cyFLI+H07ecBY9efloRBNjvNDu1y4i+SPSo3vo:Xh4TLldl1FQVXHjcu2loRBNbYKP3f
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2412 2380 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2412 2380 JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe 30 PID 2380 wrote to memory of 2412 2380 JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe 30 PID 2380 wrote to memory of 2412 2380 JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe 30 PID 2380 wrote to memory of 2412 2380 JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ead32e37f50f2286b999f7b69439f4703027a50a92c0374977ddf0d8ba005973.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 362⤵
- Program crash
PID:2412
-