Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 22:54

General

  • Target

    a88ceac0aa434a1adab556ee09f478d0_JaffaCakes118.dll

  • Size

    121KB

  • MD5

    a88ceac0aa434a1adab556ee09f478d0

  • SHA1

    57eab92df25cc06a22bcb1be2019807b5bb38a6c

  • SHA256

    9354dce871cdeaba329a92e2080b9629343725350e65e2c5ad711e58d24eb764

  • SHA512

    247afea528df81b2e49ffce3c9f443ec1e59849229ac887bbb8335902ea189ba0b61f22c7ed5ccb4cdb7464cf04346a2bbb5a3d6198b37466a1c0e02cb8ed5c1

  • SSDEEP

    3072:9PdIuG8UvahsdcYX3UI2EuJ3im/ZCdady+RlTp/VYq63+s0:9PBUyhsdEI2++M+RlTHYK

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\a88ceac0aa434a1adab556ee09f478d0_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\a88ceac0aa434a1adab556ee09f478d0_JaffaCakes118.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2132

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads