Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
be7025a6e09823d6004ac8789806fa75_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be7025a6e09823d6004ac8789806fa75_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
be7025a6e09823d6004ac8789806fa75_JaffaCakes118.dll
-
Size
72KB
-
MD5
be7025a6e09823d6004ac8789806fa75
-
SHA1
f79c5096cc39ec0f962d4da6381a5226507d98b1
-
SHA256
2140164d7ee6d6bb2998d041217191643fa7cea63dfa7a4f4d3fd2211dc3879a
-
SHA512
b6ff2d9933e5e0b28c73fd95705093c22e9ef1e65a62dbeb7eb0085cfd9574581cf6640cf1c48c3d718fb39b9f803a1587081be07c0623e288ca1bf5a410c325
-
SSDEEP
1536:xxNqX8cfiop9Dir45EVG1iTKZJZaCKVFPiYl4B2p:K4nci2aCKXPAB2p
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\(“îLrƒ>¼ regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\)$Ÿâ@P regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\)$Ÿâ@P\O„ŸX,ó^6¹±N!ŒbÆUG/,]H‚S± H:¬®X!#œ%ÙA]| = "^6¹±N!\x11ŒbÆUG/,]H‚S±\u00a0H:¬®X!#œ%ÙA]|\x1b" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\)$Ÿâ@P\ = "h(°¿G+\x1bÄ-ËP\x02+5PMµ" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QŽiTç[W}b'ÙúÉQ޲j-°¦Q$7ÈwoVI80ñ4ûÐaøöNª±s(ñHiVU"0ùâÿxú ë\ö\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\be7025a6e09823d6004ac8789806fa75_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\&+íOEQ\ = " |¾•\x18-CóD:§§T0\x15€ØV_jiw" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\&+íOEQ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\)$Ÿâ@P\ = "H,\u00ad¢p4\t“\x05ÚGW\x1a" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QŽiTç[W}b'ÙúÉQ޲j-°¦Q$7ÈwoVI80ñ4ûÐaøöNª±s(ñHiVU"0ùâÿxú ë\ö regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QŽiTç[W}b'ÙúÉQ޲j-°¦Q$7ÈwoVI80ñ4ûÐaøöNª±s(ñHiVU"0ùâÿxú ë regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4280 wrote to memory of 456 4280 regsvr32.exe 86 PID 4280 wrote to memory of 456 4280 regsvr32.exe 86 PID 4280 wrote to memory of 456 4280 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\be7025a6e09823d6004ac8789806fa75_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\be7025a6e09823d6004ac8789806fa75_JaffaCakes118.dll2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:456
-