Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
ac7b6f5947103d70c55218ffdc9f6ca6_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac7b6f5947103d70c55218ffdc9f6ca6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ac7b6f5947103d70c55218ffdc9f6ca6_JaffaCakes118.dll
-
Size
98KB
-
MD5
ac7b6f5947103d70c55218ffdc9f6ca6
-
SHA1
b63d8e8ea8759dbd964cc7fe0f09f528998f03e9
-
SHA256
bfa39a6738917fa0bf9c87977f959a3dbc6a3d8b9a23bd12a4c584d019fa8b07
-
SHA512
85b078586a7a0ebb6c3058a347db09242f1c7135be455e60ed91f26716d94ab571630307b194697b6a3a2c9068ecd83131c9f99d5d82f2602d9ab4adb1e1f424
-
SSDEEP
1536:s+WeveUOmebArs+S1a/tP94HX969wketrZMpnom73Ujwgzm:sOveUJqd+H439qmN6hJgz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ac7b6f5947103d70c55218ffdc9f6ca6_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CPStore1.CPStore.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}\ProgID\ = "CPStore1.CPStore.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0\ = "PStore 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CPStore1.CPStore.1\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CPStore1.CPStore\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ac7b6f5947103d70c55218ffdc9f6ca6_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CPStore1.CPStore.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CPStore1.CPStore regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CPStore1.CPStore\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CPStore1.CPStore.1\CLSID\ = "{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CPStore1.CPStore\CLSID\ = "{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}\VersionIndependentProgID\ = "CPStore1.CPStore" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5A6F1EBD-2DB1-11D0-8C39-00C04FD9126B}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B}\InprocServer32\ThreadingModel = "both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A6F1EC3-2DB1-11D0-8C39-00C04FD9126B} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1324 5084 regsvr32.exe 83 PID 5084 wrote to memory of 1324 5084 regsvr32.exe 83 PID 5084 wrote to memory of 1324 5084 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ac7b6f5947103d70c55218ffdc9f6ca6_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ac7b6f5947103d70c55218ffdc9f6ca6_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1324
-