Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
d5408110223ed3f45739ad0ae03c81d2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5408110223ed3f45739ad0ae03c81d2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d5408110223ed3f45739ad0ae03c81d2_JaffaCakes118.dll
-
Size
15KB
-
MD5
d5408110223ed3f45739ad0ae03c81d2
-
SHA1
839684de73595d68323392f68d06da43f7cabe28
-
SHA256
6260cc39859c48d608097ab3f15097dda982f8837e9a3bed54793bc67ad1770e
-
SHA512
2f0e2bba7d05541d9269c49f9ec1c5f0d11d2b63c1079b8a654ff472cc58e575327888e4d8c6bfbf9f45bf8794723a13716351d686d1df418b4b5e61a550d161
-
SSDEEP
384:1KEoN0ZEZxHRcZE4sHPhUbcDth+Y5ia8zL2kIzpUT:YEjK/Htth+2C2kSUT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4444 1092 regsvr32.exe 90 PID 1092 wrote to memory of 4444 1092 regsvr32.exe 90 PID 1092 wrote to memory of 4444 1092 regsvr32.exe 90
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d5408110223ed3f45739ad0ae03c81d2_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d5408110223ed3f45739ad0ae03c81d2_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1316,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:81⤵PID:1524