Analysis
-
max time kernel
102s -
max time network
105s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 19:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe
Resource
win10v2004-20250410-en
7 signatures
150 seconds
General
-
Target
JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe
-
Size
1.2MB
-
MD5
ca9d2c2a13edf2f0b4def5cd4418703c
-
SHA1
35622fc34f89ff48d9c5fd1a4a7b6e87fc413f43
-
SHA256
2bfd2bb19b2467d227fee525406c3f6c05d52603f17f1810bc4902c25ff2cc57
-
SHA512
9d22842b7e1e0fe864524847b88bf9e754342519d9afaab7acb77bad11ba8fbb368e02b712c56a3321e7a23ae7a93799fa951a8206c3ab285e45c1ad9e17cd07
-
SSDEEP
24576:R11kftiDw8qupGPCvZT9E0IqgVF0Ie3kd0PTFHTvf+WOQO8o30nrOpmv2CwwT+kz:R1WFicORTZIqg4m6Hjfa/kimvOwRoC7
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/5308-13-0x0000000000400000-0x0000000000554000-memory.dmp family_blackmoon -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5308 set thread context of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 2348 set thread context of 4196 2348 cmd.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 5632 4196 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 5308 wrote to memory of 2348 5308 JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe 84 PID 2348 wrote to memory of 4196 2348 cmd.exe 85 PID 2348 wrote to memory of 4196 2348 cmd.exe 85 PID 2348 wrote to memory of 4196 2348 cmd.exe 85 PID 2348 wrote to memory of 4196 2348 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca9d2c2a13edf2f0b4def5cd4418703c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 924⤵
- Program crash
PID:5632
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4196 -ip 41961⤵PID:2072