Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
afcb34eeb739c05a9502aeb2aae66d46_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
afcb34eeb739c05a9502aeb2aae66d46_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
afcb34eeb739c05a9502aeb2aae66d46_JaffaCakes118.dll
-
Size
117KB
-
MD5
afcb34eeb739c05a9502aeb2aae66d46
-
SHA1
f6bcc040eb397550260f736d51ffc8672291ee82
-
SHA256
ea67d626dbb1f0622f6720cfac877dc2649073c83003fe9a5988d046cb0a5827
-
SHA512
3dad93a2f409a46bcc567ebf0cc6b3565560413ed3aaabbcf591f2c4ce0caf22eacb1b420309a3415873bdb0490608922bb1185e382dde416dd0537f50796b16
-
SSDEEP
3072:QxNBaWj1l7QJwcc4l8FyFj047T/DITMd3TCe0/g8I:QLBzj1rFqA0vb0/g
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1260 wrote to memory of 5044 1260 regsvr32.exe 83 PID 1260 wrote to memory of 5044 1260 regsvr32.exe 83 PID 1260 wrote to memory of 5044 1260 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\afcb34eeb739c05a9502aeb2aae66d46_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\afcb34eeb739c05a9502aeb2aae66d46_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:5044
-