Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
ba7803a1abe4495e4132d9de92728238_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba7803a1abe4495e4132d9de92728238_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ba7803a1abe4495e4132d9de92728238_JaffaCakes118.dll
-
Size
2.4MB
-
MD5
ba7803a1abe4495e4132d9de92728238
-
SHA1
63b8c6e6a543ddd085b47572806fec6e36d5bd00
-
SHA256
7b7bac33712b49256d91fe5a9a98e9bbeadf69eee0eb358106b331572f6e7c94
-
SHA512
833f37ab53b6176af41578619ddeef03272ebe1f19152b64e8ea7d05bae49cb985ab943a6728ab63c3617f6d5adcf645c1e7b135fecb25ef4e189c62d2cddfbd
-
SSDEEP
49152:JcUqxoqAEgCgGhv8XetOEthO3F2V4/xtf92RuJ0LXbR0EVF0YYm:JZqJ6GVxr+2V4/rfgMJ0LVnr0YYm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 60 4180 regsvr32.exe 84 PID 4180 wrote to memory of 60 4180 regsvr32.exe 84 PID 4180 wrote to memory of 60 4180 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ba7803a1abe4495e4132d9de92728238_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ba7803a1abe4495e4132d9de92728238_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:60
-