Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 18:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe
-
Size
123KB
-
MD5
06aac9ecd1caf0af7d0ad0820ba4df5a
-
SHA1
46aa4cb6b95ad41cbf7b472ca2857a6ae1dcb2f8
-
SHA256
40db155ff13c3eb5120cc639c973a61668c1d5c17ee0d921048f1ddb6310b66d
-
SHA512
013f998ed4a4ca0600ebed18231d47a68c2e5f7488f83e085d58be3daecf92050614de2c5c367e3a3f23678f9cbfd427957a068ddb5e42eb3c4d0492ea911639
-
SSDEEP
768:L06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:ZR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1936 1744 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1936 1744 JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe 30 PID 1744 wrote to memory of 1936 1744 JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe 30 PID 1744 wrote to memory of 1936 1744 JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe 30 PID 1744 wrote to memory of 1936 1744 JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06aac9ecd1caf0af7d0ad0820ba4df5a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 1562⤵
- Program crash
PID:1936
-