Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 07:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe
-
Size
1.2MB
-
MD5
e0c4fb2fe31227a5da453bb02a589fba
-
SHA1
ceacc28e9b878549f6db96cf3dad2949373cc9f6
-
SHA256
abaa95fa3b6678259ec7df1354fc369794699b8319e37f6d3e5ae19adeac7f6c
-
SHA512
86924b3af055290859d7d29a402ed13c82400028957988a6af12a1e3601568f2c280836f14f75170116f13414899bf5dca5634665fa4e2bf679e94fcc5179103
-
SSDEEP
24576:B7mblEFT+c35HxdzEiJFq/5U0cxnG0tiZx3ycyGn/A5sjrVuUxK:BSb1WV3giJFq/qZxnGTxXjrVV
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\msconfig.exe" JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 3016 2776 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2868 wrote to memory of 2776 2868 JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe 30 PID 2776 wrote to memory of 3016 2776 vbc.exe 31 PID 2776 wrote to memory of 3016 2776 vbc.exe 31 PID 2776 wrote to memory of 3016 2776 vbc.exe 31 PID 2776 wrote to memory of 3016 2776 vbc.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e0c4fb2fe31227a5da453bb02a589fba.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 963⤵
- Program crash
PID:3016
-
-