Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09/01/2025, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe
-
Size
815KB
-
MD5
d1b2589806423f4f2d9156a95f15d4dc
-
SHA1
2978e197a35a7e6647aed51fc4a706baf8012002
-
SHA256
87d44ff5c5288094440d7fcc2c365c03a744cc0905fc7827212ecd3e9ff16410
-
SHA512
dbb8f2eebc9cfb50582b4586ef99ebf6a45f615c5a70b7eea173a6c57e839f54a012b984a89928456231bea6474925ae608affaed7c4d730a5dee4b6c17a5a19
-
SSDEEP
12288:ZFfiAAEJh8KrH/VvGdQDegicC17D5A+RHeSiqLSarxtyZl:riAxUKrH/pGOegoR5iqGHZ
Malware Config
Signatures
-
Expiro family
-
Expiro payload 4 IoCs
resource yara_rule behavioral1/memory/2324-0-0x0000000000DDD000-0x0000000000E71000-memory.dmp family_expiro1 behavioral1/memory/2324-1-0x0000000000D10000-0x0000000000E71000-memory.dmp family_expiro1 behavioral1/memory/2324-2-0x0000000000DDD000-0x0000000000E71000-memory.dmp family_expiro1 behavioral1/memory/2324-3-0x0000000000D10000-0x0000000000E71000-memory.dmp family_expiro1 -
Program crash 1 IoCs
pid pid_target Process procid_target 2604 2324 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2604 2324 JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe 30 PID 2324 wrote to memory of 2604 2324 JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe 30 PID 2324 wrote to memory of 2604 2324 JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe 30 PID 2324 wrote to memory of 2604 2324 JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1b2589806423f4f2d9156a95f15d4dc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1722⤵
- Program crash
PID:2604
-