Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 13:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gjspvjmvb.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/gjspvjmvb.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe
-
Size
376KB
-
MD5
a26c06af19d765ddcb32a48cd6acb1eb
-
SHA1
152dcab66baef093434bf69a0c3f9e78f7bbeb90
-
SHA256
35204f1850b1439ef9a8fd958d6c3045edae69378aa3593021795d0600fc5a01
-
SHA512
98945dbca44f5620c66efb7fc323e796e04040d0d19a1e5514843daa5c3ee6696739e9e19c6b38ff78ce3328db45d073cab471fabd591e4b962248b4d24422fb
-
SSDEEP
6144:qBlL/k6xymrfKeNn6/13qb6RVCz9j3wJPJFpSZX8F/wnq5onDZiD7ptk2:QhymjKetV+RWTiJvKnq5KDZiD7pX
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4556 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3792 4556 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 4644 4556 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 82 PID 4556 wrote to memory of 4644 4556 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 82 PID 4556 wrote to memory of 4644 4556 JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a26c06af19d765ddcb32a48cd6acb1eb.exe"2⤵PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 10282⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4556 -ip 45561⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5cb5ae97fd494cd241495179668d3a3d2
SHA133e6282a11c9140860710cd4a251e428e5cb75b8
SHA2562e31c7a695a70e216180fefa04ff81c8ad783b72b8d5fe40f506e00ada784f6f
SHA51283d265679fcb712cb8810d9b24a68c2d952cdb00656464b3c52a34a9bac48a62d2ed26d82ff0837946876bc1d992796376703a394da4c451cae671a043f32f44