Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 17:35
Static task
static1
Behavioral task
behavioral1
Sample
d4e5ad16e492c079d531c1cce62fc093_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4e5ad16e492c079d531c1cce62fc093_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d4e5ad16e492c079d531c1cce62fc093_JaffaCakes118.dll
-
Size
13KB
-
MD5
d4e5ad16e492c079d531c1cce62fc093
-
SHA1
20059e3c07cd7dc63e0c09918edfcb318efea031
-
SHA256
5b7d15817017648ef8a8423b3636afe4c8049dfb36520b3344f25c6eb621a84b
-
SHA512
8880652f5eb6240e18e5a887bc277c5eac7fee0a9a5e3bb0a709ae149d95e85f9ac09e855b05c792f174ffcadd7bbb7a585c8dd37ad9e7162b749bdfc6dca98b
-
SSDEEP
384:bmSUlm4mXWW9KgLXybC3hTBdo9UMUMvEZ:UmmyvLXyu3hLoyMUMvc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2984 2936 regsvr32.exe 30 PID 2936 wrote to memory of 2984 2936 regsvr32.exe 30 PID 2936 wrote to memory of 2984 2936 regsvr32.exe 30 PID 2936 wrote to memory of 2984 2936 regsvr32.exe 30 PID 2936 wrote to memory of 2984 2936 regsvr32.exe 30 PID 2936 wrote to memory of 2984 2936 regsvr32.exe 30 PID 2936 wrote to memory of 2984 2936 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d4e5ad16e492c079d531c1cce62fc093_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d4e5ad16e492c079d531c1cce62fc093_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2984
-