Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 02:37
Behavioral task
behavioral1
Sample
dbaa2eef998b55d946faadd124f5d1e4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbaa2eef998b55d946faadd124f5d1e4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dbaa2eef998b55d946faadd124f5d1e4_JaffaCakes118.dll
-
Size
332KB
-
MD5
dbaa2eef998b55d946faadd124f5d1e4
-
SHA1
56823b6a6ef18d43460c0f5433358c542cea691d
-
SHA256
5c02659bd72a75bd8cb27ec0ff042e2c3ced1a15c51d39e03f45e476488f67d0
-
SHA512
5ca14c345a2bbcd4f3b348cba8c4dc0804b1a46749f1876120a90b4d7ab5068c148ea7172020433bddba444846b0e9025fd0b8cf77e899f0087fc35d8987733f
-
SSDEEP
6144:5Tzh33gk+M2zZtCwyC82n+aC1meyUGimMx/BBR12ZzmF+NIivMAXafC9ii9:xJ3gptCSNW1meyUGpS/R12eHiEAKfY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\flashobj.shdocls\ = "flashobj.shdocls" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dbaa2eef998b55d946faadd124f5d1e4_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dbaa2eef998b55d946faadd124f5d1e4_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\TypeLib\ = "{9C71D782-083D-473C-AF9D-D358D7449784}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\VERSION regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\flashobj.shdocls\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\flashobj.shdocls\Clsid\ = "{F39F6E1F-0E77-40AC-90C6-60753E3C965B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\ = "flashobj.shdocls" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0\ = "flashobj" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\TypeLib\ = "{9C71D782-083D-473C-AF9D-D358D7449784}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ = "shdocls" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\TypeLib\ = "{9C71D782-083D-473C-AF9D-D358D7449784}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\ProgID\ = "flashobj.shdocls" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ProxyStubClsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ = "_shdocls" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{9C71D782-083D-473C-AF9D-D358D7449784}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50ED4DA8-0C5F-472F-A6D4-4AFB82510676}\ = "_shdocls" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F39F6E1F-0E77-40AC-90C6-60753E3C965B}\VERSION\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\flashobj.shdocls regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2828 wrote to memory of 4832 2828 regsvr32.exe 84 PID 2828 wrote to memory of 4832 2828 regsvr32.exe 84 PID 2828 wrote to memory of 4832 2828 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dbaa2eef998b55d946faadd124f5d1e4_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dbaa2eef998b55d946faadd124f5d1e4_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4832
-