Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 02:23
Behavioral task
behavioral1
Sample
JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe
-
Size
192KB
-
MD5
79d6c10258252b6de2d23597f228f024
-
SHA1
7d057f2c471aeb09bbeddbce6df2f93cf1134318
-
SHA256
a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919
-
SHA512
cd5ddcbe8a4e18ecace30515ccab374dccdc61dd93b658c59f4d28f5f415451f06da48c6a09465cf5aa3ec15e3b81edb3b396680399f5910919115ca636998c1
-
SSDEEP
3072:B0n0XeJF3JeIlm2oBL/LkflP1azYpm8MP3Rv7eCFWskX09a:m9BlKL/27azYpmpP357eCFWskX09
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2056 1616 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2056 1616 JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe 30 PID 1616 wrote to memory of 2056 1616 JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe 30 PID 1616 wrote to memory of 2056 1616 JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe 30 PID 1616 wrote to memory of 2056 1616 JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a3fd01b1b813f4a186d97895b185eb7b7497f5954aff747f52f507fe22a1c919.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 362⤵
- Program crash
PID:2056
-