Analysis
-
max time kernel
90s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
eac231fffca1e01031f1f122c3c083e7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac231fffca1e01031f1f122c3c083e7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eac231fffca1e01031f1f122c3c083e7_JaffaCakes118.dll
-
Size
97KB
-
MD5
eac231fffca1e01031f1f122c3c083e7
-
SHA1
f9b358442226267ba5b872cfe97f04a1e112edd1
-
SHA256
ca59f55f7b697d8009da7ac7f54ad7721c8edb1ad3d63e22a303be8b42718c08
-
SHA512
9d53a65c084e50922257bb6dbb42e6efab5341f9ae90c7ba871b92cd84bb4aca6fc172b700dd3049f7cdc62b7bf8239e7c9edf88216cd25e24e4be07006ee7d5
-
SSDEEP
3072:Ea+nWrGpxvc0KJeHLnPwmGsdbMymUPlfA:Ea+WyMeHjY+hMymUPl4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1364 wrote to memory of 4524 1364 regsvr32.exe 84 PID 1364 wrote to memory of 4524 1364 regsvr32.exe 84 PID 1364 wrote to memory of 4524 1364 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eac231fffca1e01031f1f122c3c083e7_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\eac231fffca1e01031f1f122c3c083e7_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4524
-