Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
962956a8121801bb2eb736ef733b7cd8_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
962956a8121801bb2eb736ef733b7cd8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
962956a8121801bb2eb736ef733b7cd8_JaffaCakes118.dll
-
Size
36KB
-
MD5
962956a8121801bb2eb736ef733b7cd8
-
SHA1
417ed162e0cc28d67ebe1d37ede95c5d81b1ab32
-
SHA256
81eeafd22e73dc6dd0d04c89b6ce8d5b15f42cc34db5ed2d872f45639fd7f24f
-
SHA512
9468088ad01231d0e9f1b0e9a654085322571bb777d19d63f22b24cebad67c19fe78005fb3411cda3306e30b5782c706f5fd9c41cdd90ad7d800c20c8a2a0fb5
-
SSDEEP
768:xnQoi6qZOMQOppiulSbiVVSIxRQW7Zd1UKdQw82rea/Ip:VQv6qZpQcFVAIr3XC2nea/I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2416 wrote to memory of 5064 2416 regsvr32.exe 84 PID 2416 wrote to memory of 5064 2416 regsvr32.exe 84 PID 2416 wrote to memory of 5064 2416 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\962956a8121801bb2eb736ef733b7cd8_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\962956a8121801bb2eb736ef733b7cd8_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:5064
-