Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 14:38
Static task
static1
Behavioral task
behavioral1
Sample
867260e6cde81143532acc1a06c05a26_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
867260e6cde81143532acc1a06c05a26_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
867260e6cde81143532acc1a06c05a26_JaffaCakes118.dll
-
Size
253KB
-
MD5
867260e6cde81143532acc1a06c05a26
-
SHA1
3f6b309fc2487c921c1053a738f9f455f1fd4bd7
-
SHA256
5d2ec19f8253bb4feb95c501250884f9a3b806c5eef42f37a7fab9dab9e30836
-
SHA512
9c024c25ad8eb2abf8dcdf07d47816fc125a51599ae2b0e13c69d43c36efc7fc94d4995c450382bf60cfd5ed26c784cf7e9d4933c35341a228b24613b6ac6354
-
SSDEEP
6144:wp78nMINWDBVEASAQ9Fl13ATzbttb8IWZ9f9:0IN8fE5sTXtmD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4600 wrote to memory of 4936 4600 regsvr32.exe 84 PID 4600 wrote to memory of 4936 4600 regsvr32.exe 84 PID 4600 wrote to memory of 4936 4600 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\867260e6cde81143532acc1a06c05a26_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\867260e6cde81143532acc1a06c05a26_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4936
-