Analysis
-
max time kernel
138s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
86576d51d186ef022c4fd0f87a7215c4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86576d51d186ef022c4fd0f87a7215c4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
86576d51d186ef022c4fd0f87a7215c4_JaffaCakes118.dll
-
Size
124KB
-
MD5
86576d51d186ef022c4fd0f87a7215c4
-
SHA1
bf288531c7e226c778b65d9c36783d7bebe0c983
-
SHA256
704d66bce6c441de75e1217cc334ab83b7dd3a3f429d7f836d10ee63d7298b30
-
SHA512
e35984d5b768ba27e4aa20a981570695e8fc831d0a6edea607a42faf217a87b71e3b6cfa6afd2e5974835f6f4164197bcbf0429904e993af0e603a7783981650
-
SSDEEP
3072:0kx/KVK7n9FS7SB0T7b1kqSpiGNpTy9LZ:0ayVk9060T7b1cadZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 4480 1452 regsvr32.exe 86 PID 1452 wrote to memory of 4480 1452 regsvr32.exe 86 PID 1452 wrote to memory of 4480 1452 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\86576d51d186ef022c4fd0f87a7215c4_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\86576d51d186ef022c4fd0f87a7215c4_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4480
-