Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
9fe485d2bbfd64cf0673eccc52d1a5ba_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9fe485d2bbfd64cf0673eccc52d1a5ba_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9fe485d2bbfd64cf0673eccc52d1a5ba_JaffaCakes118.dll
-
Size
592KB
-
MD5
9fe485d2bbfd64cf0673eccc52d1a5ba
-
SHA1
97ab536d8ea2ae09d050d94c204b0605df7438f9
-
SHA256
9160a3bc7aedab8e20a56f15fe896aaa16773163345a408987a7225ddc5bca3b
-
SHA512
79820b3d1c09a0a175f288f8ef51ad3776e8f6405dd66f6e7d7f9df52f320125e6d0ae60fa5e9dc213d71821e487eeb901515ec63a30007b7bb1c8a82ddbca08
-
SSDEEP
12288:8SFre+WKM+A9bGRG7C60ylr4vGlSXpaRKgpRxP:8SFC9bcSEvG4pdgpv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3684 wrote to memory of 2428 3684 regsvr32.exe 86 PID 3684 wrote to memory of 2428 3684 regsvr32.exe 86 PID 3684 wrote to memory of 2428 3684 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\9fe485d2bbfd64cf0673eccc52d1a5ba_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\9fe485d2bbfd64cf0673eccc52d1a5ba_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2428
-