Analysis
-
max time kernel
116s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
93af566f37324383dfdf90a29427acd3_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
93af566f37324383dfdf90a29427acd3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
93af566f37324383dfdf90a29427acd3_JaffaCakes118.dll
-
Size
253KB
-
MD5
93af566f37324383dfdf90a29427acd3
-
SHA1
37a2e8b150a4363866a190eacc5a223aae15f539
-
SHA256
a0a2e5616f893dd517c8a32c5dfadbe4c0c89f4b48bf34509ccab995390d768c
-
SHA512
eba55aaebf33266e023dceedaa6286ca79eac93295db6f723df650e83c271c29d446a8dd745075c1b67218096a83da004a67031584b699d2824f953cacbdf2e2
-
SSDEEP
6144:wp78nMINWDBVEASAd9Fl13ATzbttb8IWZ9f9:0IN8fE6sTXtmD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3608 wrote to memory of 2784 3608 regsvr32.exe 82 PID 3608 wrote to memory of 2784 3608 regsvr32.exe 82 PID 3608 wrote to memory of 2784 3608 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\93af566f37324383dfdf90a29427acd3_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\93af566f37324383dfdf90a29427acd3_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2784
-