Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
b6bb71dc57adac6551e1acb5f9216581_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b6bb71dc57adac6551e1acb5f9216581_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b6bb71dc57adac6551e1acb5f9216581_JaffaCakes118.dll
-
Size
90KB
-
MD5
b6bb71dc57adac6551e1acb5f9216581
-
SHA1
f62b79823b8ff80232fd0e42bf1ece225dace984
-
SHA256
3b64be3f8c2692cafa792dd776521469e77c6c42a2c212864acc3ce1ce9d0586
-
SHA512
05a911f86e869623d462dc5870308ef50ca6d769f34d91d83973da1d770a16ebc443592621383c85b214649b0c36108ddeb40b0e18afa475fe437b90c0941663
-
SSDEEP
1536:BOgmnRf6PEfh45vmifP7LqkIhZGFJowsxg02orIf+P97+toc2yPyWjhk4yA/kQP/:BcnR7fh40kIhcoZ3Ww970O4J/j
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4384 4012 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 4012 3624 regsvr32.exe 92 PID 3624 wrote to memory of 4012 3624 regsvr32.exe 92 PID 3624 wrote to memory of 4012 3624 regsvr32.exe 92
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b6bb71dc57adac6551e1acb5f9216581_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b6bb71dc57adac6551e1acb5f9216581_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 5963⤵
- Program crash
PID:4384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4012 -ip 40121⤵PID:512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1036,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=3676 /prefetch:81⤵PID:4184