Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 23:55
Behavioral task
behavioral1
Sample
69780c87f99d976c05f34e8a582ac2ba_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
69780c87f99d976c05f34e8a582ac2ba_JaffaCakes118.dll
-
Size
70KB
-
MD5
69780c87f99d976c05f34e8a582ac2ba
-
SHA1
9ee96e43c0a16e75df5365db2210b06381819e70
-
SHA256
38e54c6f3512d7536246d75892065cf72d4ab3c0fa30ebb04f680d7633cf30f5
-
SHA512
ef559b16b0e4d30738483ffc1136f59f6d4783d2ffbfecd4b03fc2c19c7125a20df3538dfeea4597a28365c3b477112a22ddad50932f1825b05d32b595e580b0
-
SSDEEP
1536:2XLwtq0c49MKioFjSz1UFLE/dW5MMbKl89h9LMTlp/8zWqlLqw7t1FVSr77Gnout:2XLwt/FiaU1Uq/dWFbNr8azD7VS372ou
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2340-2-0x00000000002E0000-0x0000000000316000-memory.dmp upx behavioral1/memory/2340-0-0x0000000000340000-0x0000000000376000-memory.dmp upx behavioral1/memory/2340-3-0x00000000002E0000-0x0000000000316000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1968 2340 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2340 1688 regsvr32.exe 30 PID 1688 wrote to memory of 2340 1688 regsvr32.exe 30 PID 1688 wrote to memory of 2340 1688 regsvr32.exe 30 PID 1688 wrote to memory of 2340 1688 regsvr32.exe 30 PID 1688 wrote to memory of 2340 1688 regsvr32.exe 30 PID 1688 wrote to memory of 2340 1688 regsvr32.exe 30 PID 1688 wrote to memory of 2340 1688 regsvr32.exe 30 PID 2340 wrote to memory of 1968 2340 regsvr32.exe 31 PID 2340 wrote to memory of 1968 2340 regsvr32.exe 31 PID 2340 wrote to memory of 1968 2340 regsvr32.exe 31 PID 2340 wrote to memory of 1968 2340 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\69780c87f99d976c05f34e8a582ac2ba_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\69780c87f99d976c05f34e8a582ac2ba_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 3203⤵
- Program crash
PID:1968
-
-