Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
7868a43364dfcc1c96db1c36bcd6f6fe_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7868a43364dfcc1c96db1c36bcd6f6fe_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
7868a43364dfcc1c96db1c36bcd6f6fe_JaffaCakes118.dll
-
Size
97KB
-
MD5
7868a43364dfcc1c96db1c36bcd6f6fe
-
SHA1
e036c1cbb43b73d089353aafcc3d2029bef5298d
-
SHA256
62ce6fe91a8e5464aeda689c77df2c8bf02256bf272e5e41e9929e72f32fea36
-
SHA512
381b90ee73276ec149863433a028193aff4d4acbbbb47a0bef7eb47fcb35f3e04d3d3f18fd98984b7ed9f4910e3d173b37749b3b469d4efbef54365752e2b5fe
-
SSDEEP
1536:wMqzW7JoS7qxgY96riqT2KazWkokkkkkkotV74wooRJ7QMpQa:w5OK1bzWkokkkkkkcVUwooRJ8Mp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 2368 404 regsvr32.exe 84 PID 404 wrote to memory of 2368 404 regsvr32.exe 84 PID 404 wrote to memory of 2368 404 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7868a43364dfcc1c96db1c36bcd6f6fe_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7868a43364dfcc1c96db1c36bcd6f6fe_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2368
-