Analysis
-
max time kernel
134s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
c01d91e743c17c57a7a71c271929fa1b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c01d91e743c17c57a7a71c271929fa1b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c01d91e743c17c57a7a71c271929fa1b_JaffaCakes118.dll
-
Size
253KB
-
MD5
c01d91e743c17c57a7a71c271929fa1b
-
SHA1
e94d56be555b5f599ad631aed9120d44d5912a5e
-
SHA256
accd260b36dce03e005abd49bf96d8ba91a0c9902a6c288dcf84e8b631adbc7e
-
SHA512
c8e7482df298c9d39d0ffacaebd62efef0ac2f97bb36ad8c1629f03d0be723c62fbda363809f8185f36c39099b84bdda5d0f3522fafbb5e6d67fdc6bc7d2b778
-
SSDEEP
6144:wp78nMINWDBVEASAk9Fl13ATzbttb8IWZ9f9:0IN8fEJsTXtmD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3636 wrote to memory of 2432 3636 regsvr32.exe 84 PID 3636 wrote to memory of 2432 3636 regsvr32.exe 84 PID 3636 wrote to memory of 2432 3636 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c01d91e743c17c57a7a71c271929fa1b_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c01d91e743c17c57a7a71c271929fa1b_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2432
-