Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
ced9be0e010ffbd4b1cee26f0e59bf87_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ced9be0e010ffbd4b1cee26f0e59bf87_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ced9be0e010ffbd4b1cee26f0e59bf87_JaffaCakes118.dll
-
Size
332KB
-
MD5
ced9be0e010ffbd4b1cee26f0e59bf87
-
SHA1
3e48e44870ec51c06ea3c6fd34c42700240872e7
-
SHA256
dc51994a757f282b71e7badc4ca54f358faa520a17d22c1cbf11c3e67a70ac5b
-
SHA512
5919d16a46afb01f8545cae2f41a77b6cf1c19a5d943944e7be647be940604af45b27d8740077eafb36a507a6235f378d973f5637519148ca5f5c5a4a7046141
-
SSDEEP
3072:km5Bn2DaTZ19E2crX64dfHbkF2bOUxp/fqlC9e55yx:NznOa/wjeQj59
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4528 1596 regsvr32.exe 83 PID 1596 wrote to memory of 4528 1596 regsvr32.exe 83 PID 1596 wrote to memory of 4528 1596 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ced9be0e010ffbd4b1cee26f0e59bf87_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ced9be0e010ffbd4b1cee26f0e59bf87_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4528
-