Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
84b680fe7cdc8e1f4cf801ef95ddbe91_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84b680fe7cdc8e1f4cf801ef95ddbe91_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
84b680fe7cdc8e1f4cf801ef95ddbe91_JaffaCakes118.dll
-
Size
84KB
-
MD5
84b680fe7cdc8e1f4cf801ef95ddbe91
-
SHA1
c9b61f4b74c6b5117178bfe4bcfb7ab2a3d3f7db
-
SHA256
158934789c2f1b601ede576b555bb37d647ebf24a610357146fb1005de2f0052
-
SHA512
075aaae4e5e49566e763526bb68f3db3cc810739b05e5015fade94ee86286c4e160a42b9092f9cf890ce6513405d31bc88f9329ae6d0ff65c9f5d272fa92704e
-
SSDEEP
1536:auNkS0YVUuGnSFrVzaRR81135d1N8vrICbdoEcVna2hJC:3iS0lSvJ1pzEbdoEcVna2j
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\84b680fe7cdc8e1f4cf801ef95ddbe91_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0\ = "loader_c 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{23539089-449C-270A-8C6F-DEEBDA8C2A2E}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2956 wrote to memory of 4724 2956 regsvr32.exe 84 PID 2956 wrote to memory of 4724 2956 regsvr32.exe 84 PID 2956 wrote to memory of 4724 2956 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\84b680fe7cdc8e1f4cf801ef95ddbe91_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\84b680fe7cdc8e1f4cf801ef95ddbe91_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4724
-