Analysis
-
max time kernel
104s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2025, 19:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe
Resource
win10v2004-20250410-en
7 signatures
150 seconds
General
-
Target
JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe
-
Size
1.2MB
-
MD5
ca9d2c2a13edf2f0b4def5cd4418703c
-
SHA1
35622fc34f89ff48d9c5fd1a4a7b6e87fc413f43
-
SHA256
2bfd2bb19b2467d227fee525406c3f6c05d52603f17f1810bc4902c25ff2cc57
-
SHA512
9d22842b7e1e0fe864524847b88bf9e754342519d9afaab7acb77bad11ba8fbb368e02b712c56a3321e7a23ae7a93799fa951a8206c3ab285e45c1ad9e17cd07
-
SSDEEP
24576:R11kftiDw8qupGPCvZT9E0IqgVF0Ie3kd0PTFHTvf+WOQO8o30nrOpmv2CwwT+kz:R1WFicORTZIqg4m6Hjfa/kimvOwRoC7
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2900-13-0x0000000000400000-0x0000000000554000-memory.dmp family_blackmoon -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2900 set thread context of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 3780 set thread context of 4888 3780 cmd.exe 95 -
Program crash 1 IoCs
pid pid_target Process procid_target 1636 4888 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 2900 wrote to memory of 3780 2900 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 94 PID 3780 wrote to memory of 4888 3780 cmd.exe 95 PID 3780 wrote to memory of 4888 3780 cmd.exe 95 PID 3780 wrote to memory of 4888 3780 cmd.exe 95 PID 3780 wrote to memory of 4888 3780 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 804⤵
- Program crash
PID:1636
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4888 -ip 48881⤵PID:100