Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
7797b755e762dc08c9a04eaec756c17c_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7797b755e762dc08c9a04eaec756c17c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
7797b755e762dc08c9a04eaec756c17c_JaffaCakes118.dll
-
Size
141KB
-
MD5
7797b755e762dc08c9a04eaec756c17c
-
SHA1
499521c9f525dea3eaa9116959beac5aa783eebd
-
SHA256
431a49183fda2363b3e6a806d76e77f87b90f597562737458222a5cae0cff63b
-
SHA512
256361c8e234b877681da9d46e376a7380ed29bdd43e9d2f58aa8dd7a7e623a7e5c6ac99f93c89de78c913cc5e12ad84711af967e51817fd7b9c356fa1e96385
-
SSDEEP
3072:2AKQq+MrHwV2M2HM/1gq3Gx5x0Ebotp1b:pKQqeKMdBGfGEeb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84DA4FDF-A1CF-4195-8688-3E961F505983}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84DA4FDF-A1CF-4195-8688-3E961F505983} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84DA4FDF-A1CF-4195-8688-3E961F505983}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7797b755e762dc08c9a04eaec756c17c_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{84DA4FDF-A1CF-4195-8688-3E961F505983}\InprocServer32\ThreadingModel = "Both" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2144 2604 regsvr32.exe 29 PID 2604 wrote to memory of 2144 2604 regsvr32.exe 29 PID 2604 wrote to memory of 2144 2604 regsvr32.exe 29 PID 2604 wrote to memory of 2144 2604 regsvr32.exe 29 PID 2604 wrote to memory of 2144 2604 regsvr32.exe 29 PID 2604 wrote to memory of 2144 2604 regsvr32.exe 29 PID 2604 wrote to memory of 2144 2604 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7797b755e762dc08c9a04eaec756c17c_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7797b755e762dc08c9a04eaec756c17c_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2144
-