Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
dab9df4c35e88c055f6b0c930cdb573d_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dab9df4c35e88c055f6b0c930cdb573d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dab9df4c35e88c055f6b0c930cdb573d_JaffaCakes118.dll
-
Size
158KB
-
MD5
dab9df4c35e88c055f6b0c930cdb573d
-
SHA1
31dcb4c3054faa26b0bd4f7043e4603622717a71
-
SHA256
1ed30e7800cf17f35f5b66510adc1dc2b516f1ba4e1e6dd125ee8cf1ee3f073b
-
SHA512
058446ed37288d65ccb93f2c8b5d4b45fbbec839f0e22c2163260eaa877f74e67224bf09347e579e399b5780b3a4b3c855cf751004016b1839b5c06e04e26ba7
-
SSDEEP
3072:yggqI3XzS99ti7cNJrww/E3sOLMzLRAldao:pgFzSXti78Jrww/E3sS6il5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4472 wrote to memory of 712 4472 regsvr32.exe 82 PID 4472 wrote to memory of 712 4472 regsvr32.exe 82 PID 4472 wrote to memory of 712 4472 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dab9df4c35e88c055f6b0c930cdb573d_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dab9df4c35e88c055f6b0c930cdb573d_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:712
-