Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 20:21
Behavioral task
behavioral1
Sample
d062ef816bff93a8e7610401f27e21be_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
d062ef816bff93a8e7610401f27e21be_JaffaCakes118.dll
-
Size
35KB
-
MD5
d062ef816bff93a8e7610401f27e21be
-
SHA1
c2f1850cc141985f6d39506a134ecdc2f85ec46e
-
SHA256
625042a3b9c92dd707066de9bebb299fc8bd19584ce228f68100cd383a65f86c
-
SHA512
dd9c273e177a8648617c55550ca26c020cb6b1feee1c58677f7ad77e2f50bca6347b18f0ec42deeb0a2f7485863df774347984e3111ee2a09f3276d2c23ded03
-
SSDEEP
768:V0Z+DY0WGsBUg+xDzxkzSq3vOx7bkt7caAOz:VcoSUBpzxkzV/Ohkt7caN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4800-0-0x0000000020000000-0x000000002001F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 820 wrote to memory of 4800 820 regsvr32.exe 83 PID 820 wrote to memory of 4800 820 regsvr32.exe 83 PID 820 wrote to memory of 4800 820 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d062ef816bff93a8e7610401f27e21be_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d062ef816bff93a8e7610401f27e21be_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4800
-