Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:21
Behavioral task
behavioral1
Sample
ea7d5e300ee6477c87901fad0d106e4e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7d5e300ee6477c87901fad0d106e4e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea7d5e300ee6477c87901fad0d106e4e_JaffaCakes118.dll
-
Size
630KB
-
MD5
ea7d5e300ee6477c87901fad0d106e4e
-
SHA1
6257255974931c459310555114fea8d01cf2e9c4
-
SHA256
4659b48bb89a875a9ad5d5558852c2afc23db7c9fccdb5aa0842d92f58890b5c
-
SHA512
b3d3fc52d4cf93044107fec266b74131f00cca264037c035326d1dcd7467d8603a1b86fbbaecc06d2f16c60901a8f3d3abb4f7310c219652fb35e93ba0047440
-
SSDEEP
12288:Fnd3WsHXAVP61BwA6BAbFgAQ1i+XzwtUgLm80OFOJvmFmpeFVm:xdWCAVP6UAeAh68+XVhGQmcpWm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3728 4280 regsvr32.exe 82 PID 4280 wrote to memory of 3728 4280 regsvr32.exe 82 PID 4280 wrote to memory of 3728 4280 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\ea7d5e300ee6477c87901fad0d106e4e_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\ea7d5e300ee6477c87901fad0d106e4e_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:3728
-