Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 19:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe
-
Size
1.6MB
-
MD5
ec0f945f3e7544a7669fb5ac1cd609bf
-
SHA1
4b863e309c374728500a76a1d3de173d47a0a72f
-
SHA256
1f4ceee271263c21fa2da7ef6d1fa69578668b2481c1d0fabef7e3cf5f786fb0
-
SHA512
bbbdca52efecc51527ec1f84c80d5f5e2eff575e4db699829eb226d5a047f1500130de9a66a043fdba5bc2ce4a1b79204f46e0bb8287f5034a18009114b12977
-
SSDEEP
49152:YVg5tQ7aqqFLtoxI3oaETFmr6RBzDLbfR85:ag568YxF86RRvd
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 316 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3508 316 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 316 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 83 PID 2064 wrote to memory of 316 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 83 PID 2064 wrote to memory of 316 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 83 PID 2064 wrote to memory of 316 2064 JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ec0f945f3e7544a7669fb5ac1cd609bf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵PID:316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 843⤵
- Program crash
PID:3508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 316 -ip 3161⤵PID:3392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD59121ea4b2df05fbcd7a13eebefe7d8be
SHA1e7667a3944525d7b315dc715b5e4f5255d170d6d
SHA2569de421603eb5b19624846faabe17d1b2fbab04359def6e6d389ca5a4eb751a73
SHA5126d5f85347b33e0b9fa93282e9713ce7055fcf428c4306c8a1ef70e77ea0a2273cdab03edd897f134feb7c203d181de3a634483512e1373f64b6a8204214c8ffe