Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 17:05
Behavioral task
behavioral1
Sample
74f23d330716e57ffccef81100c6da34_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
3 signatures
150 seconds
General
-
Target
74f23d330716e57ffccef81100c6da34_JaffaCakes118.dll
-
Size
652KB
-
MD5
74f23d330716e57ffccef81100c6da34
-
SHA1
ee894ee6aee3274ac20959690f4874f40e135b1a
-
SHA256
36c1e9f0f9d46dd2c6000bc9fe747e865ac39dd6cad8dc4c96c5d8d5e1b59b74
-
SHA512
ae0831e7dcdc80874b0635ddaebc6ee53b7b7e43235cc9fbd6daf67c0751efa58175ec1e191e3e9b4d7a01d8f5d9bade28c78b36d76a8902b21e1d07b66a8691
-
SSDEEP
12288:e1ULVrYI7IuxS/jFY3Q4kXFLCpN3C9ch6WFu7ec1ev7snvIIgpR7tPq:Ac/xS/ji35T09ch6WLIev7snvIIgrtC
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3496-0-0x0000000000400000-0x00000000008E7000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3496 2404 regsvr32.exe 84 PID 2404 wrote to memory of 3496 2404 regsvr32.exe 84 PID 2404 wrote to memory of 3496 2404 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\74f23d330716e57ffccef81100c6da34_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\74f23d330716e57ffccef81100c6da34_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:3496
-