Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 20:41
Behavioral task
behavioral1
Sample
JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe
-
Size
188KB
-
MD5
7bc94253518c7c29b7efd7653d2984ab
-
SHA1
521e9b3a47b13081df8fb35a728f0409390a34e2
-
SHA256
c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122
-
SHA512
623ed6fa8fec09f0002e108cc4a90ce3e83e7c4823146ad9d0ba9f2b4a40910cebc356ad7d0d7ff8142193228ee18c2d66c4777235f4580b7fc03e7596b23166
-
SSDEEP
3072:bl9IRQq3SmEO64V1NgW97rxWxzNci1o3IylroWtECO+Zzmnks5JyBG+:blMQGMINHo5NNC3IkroWOQztGJyBG
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2420 2696 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2420 2696 JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe 30 PID 2696 wrote to memory of 2420 2696 JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe 30 PID 2696 wrote to memory of 2420 2696 JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe 30 PID 2696 wrote to memory of 2420 2696 JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c6c5f8eb87c341b9afbe1fbba5f8d0dcaa04d5ce94f6da1fb2d1f9b5bee8e122.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 362⤵
- Program crash
PID:2420
-