Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
c0604d7d1fda47266b99e5ea9bb49409_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0604d7d1fda47266b99e5ea9bb49409_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
inshopping.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
inshopping.dll
Resource
win10v2004-20240802-en
General
-
Target
inshopping.dll
-
Size
170KB
-
MD5
0dedccb32207e568679870f145c1130e
-
SHA1
d2fa5a1eae7dd4500f2c9ac81f2e8118b73009a1
-
SHA256
4a513547bdd46e267f66d3311cf22aad9e9bb6d7e2dc81002a319393fab0c96c
-
SHA512
aa4589b606082a05b441443a03f8c04d7dbb9da534a35e3984b48e96f4385419f76fdcd78e61fb812189ac2bc3e008149b19da6401626ffa9f51e555f3281b42
-
SSDEEP
3072:XEQaxjsMwuvKOJvwRrRcAMtYG5igUkTq1WMhSOAQRbO+:l0js2vKO063YG8gYWkNh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4896 regsvr32.exe 3348 regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4896 wrote to memory of 3348 4896 regsvr32.exe 84 PID 4896 wrote to memory of 3348 4896 regsvr32.exe 84 PID 4896 wrote to memory of 3348 4896 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\inshopping.dll1⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\inshopping.dll2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3348
-