Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
87bc31f5ade7944b3783fdad91c1ce68_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
87bc31f5ade7944b3783fdad91c1ce68_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
87bc31f5ade7944b3783fdad91c1ce68_JaffaCakes118.dll
-
Size
411KB
-
MD5
87bc31f5ade7944b3783fdad91c1ce68
-
SHA1
ae0f31a6a62f4397d7749c84d833180aab49d648
-
SHA256
65f21d0cbb27127c7ac16b77b999edd17e437776124e0df4c42958ffc71c8d89
-
SHA512
eeaff7b5af3912d2fa505daef369c77bf4ba177ae971a83f6662625cf12a62c4352ea8d8cfa0d9ffa843c35e897bff398a26d161710e481baf3ecb95d35b8efa
-
SSDEEP
12288:M585lx1ntcU3YZCLei3sKX+4qFkCPvByJEQTr+dD4J:M58j3YCSesk+4qFpIrTr+d
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1708 1644 regsvr32.exe 29 PID 1644 wrote to memory of 1708 1644 regsvr32.exe 29 PID 1644 wrote to memory of 1708 1644 regsvr32.exe 29 PID 1644 wrote to memory of 1708 1644 regsvr32.exe 29 PID 1644 wrote to memory of 1708 1644 regsvr32.exe 29 PID 1644 wrote to memory of 1708 1644 regsvr32.exe 29 PID 1644 wrote to memory of 1708 1644 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\87bc31f5ade7944b3783fdad91c1ce68_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\87bc31f5ade7944b3783fdad91c1ce68_JaffaCakes118.dll2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1708
-