Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 09:44
Behavioral task
behavioral1
Sample
e23246d5a16fd344dfd2fc7177d43890_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
General
-
Target
e23246d5a16fd344dfd2fc7177d43890_JaffaCakes118.dll
-
Size
3.2MB
-
MD5
e23246d5a16fd344dfd2fc7177d43890
-
SHA1
9d0ee3d8896911c2743ff89c72c30639f0851f52
-
SHA256
f4f02f78b8d89ed5063773985d4ad7b4c9205417b34787fb945f739134a85a8b
-
SHA512
01d4b4c0c60272759906f3c2d255a0378c9b4c081878866c9beef187a8c58b53d7da50109541f2da3051035e72b7a60b54710d6e3cddd01a28eb1009bc6af1ed
-
SSDEEP
49152:GYRxMUVRngWxp5Czu06spJDJXv2Suyic6346LE3Vtj2RwA+M:GuS0RnNYss5XvMy0346g3emA
Malware Config
Extracted
Family
buer
C2
complexofferstobakn.com
Signatures
-
resource yara_rule behavioral1/memory/1948-0-0x00000000742B0000-0x000000007476F000-memory.dmp buer -
resource yara_rule behavioral1/memory/1948-0-0x00000000742B0000-0x000000007476F000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1948 2336 regsvr32.exe 30 PID 2336 wrote to memory of 1948 2336 regsvr32.exe 30 PID 2336 wrote to memory of 1948 2336 regsvr32.exe 30 PID 2336 wrote to memory of 1948 2336 regsvr32.exe 30 PID 2336 wrote to memory of 1948 2336 regsvr32.exe 30 PID 2336 wrote to memory of 1948 2336 regsvr32.exe 30 PID 2336 wrote to memory of 1948 2336 regsvr32.exe 30
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\e23246d5a16fd344dfd2fc7177d43890_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\e23246d5a16fd344dfd2fc7177d43890_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:1948
-