Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
d0e492f6fa461f32a3e39302b9d75faf_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0e492f6fa461f32a3e39302b9d75faf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d0e492f6fa461f32a3e39302b9d75faf_JaffaCakes118.dll
-
Size
575KB
-
MD5
d0e492f6fa461f32a3e39302b9d75faf
-
SHA1
31a5e3e2086e41beed4f3a11e5dc676a8e0789cc
-
SHA256
f11ce4c4b4c82bb8cbcef0250edd8187c1bd8985e8600218ebb6ca03b89ad768
-
SHA512
e65305f6309191de4a667f517a968df04fcc55a39709f380c85764175078c4535cb5d0ff48e4c5fd0771ca37f46fc165bbf72e6529a1876714136314f7a77bdd
-
SSDEEP
3072:OEk+A3dQqxauRFr3Dly3+rygfsJfeQiXQOrbmfzqtUePaf3LnR5k3WvWQ:Or+ArVRFKufafe/QOuzq2ePOrR5k3WO
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2768 2692 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 816 wrote to memory of 2692 816 regsvr32.exe 31 PID 816 wrote to memory of 2692 816 regsvr32.exe 31 PID 816 wrote to memory of 2692 816 regsvr32.exe 31 PID 816 wrote to memory of 2692 816 regsvr32.exe 31 PID 816 wrote to memory of 2692 816 regsvr32.exe 31 PID 816 wrote to memory of 2692 816 regsvr32.exe 31 PID 816 wrote to memory of 2692 816 regsvr32.exe 31 PID 2692 wrote to memory of 2768 2692 regsvr32.exe 32 PID 2692 wrote to memory of 2768 2692 regsvr32.exe 32 PID 2692 wrote to memory of 2768 2692 regsvr32.exe 32 PID 2692 wrote to memory of 2768 2692 regsvr32.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d0e492f6fa461f32a3e39302b9d75faf_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d0e492f6fa461f32a3e39302b9d75faf_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 2963⤵
- Program crash
PID:2768
-
-