Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
7213f3cf2aa5db51713245a74dcf62a1_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7213f3cf2aa5db51713245a74dcf62a1_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
7213f3cf2aa5db51713245a74dcf62a1_JaffaCakes118.dll
-
Size
253KB
-
MD5
7213f3cf2aa5db51713245a74dcf62a1
-
SHA1
193e917513b260654d6915a83d4fec5d05abe0df
-
SHA256
3f963ff1ac3a76d0588e31e8dfbe101be955d3e1c9b396e275e487372a28bd86
-
SHA512
f268a6b6dda359f4241f9efb72d0deebbdc26a695467d6d3311fed7b75d7c991e893e52c24ff01bf0895d3cb9cc2aa4fed6821c1a783933071bc0aaf68242608
-
SSDEEP
6144:wp78nMINWDBVEASAC9Fl13ATzbttb8IWZ9f9:0IN8fErsTXtmD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4244 wrote to memory of 3596 4244 regsvr32.exe 84 PID 4244 wrote to memory of 3596 4244 regsvr32.exe 84 PID 4244 wrote to memory of 3596 4244 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7213f3cf2aa5db51713245a74dcf62a1_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7213f3cf2aa5db51713245a74dcf62a1_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:3596
-