Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
eac3bfddb0f7df1a0aef7673d4f60607_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac3bfddb0f7df1a0aef7673d4f60607_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eac3bfddb0f7df1a0aef7673d4f60607_JaffaCakes118.dll
-
Size
31KB
-
MD5
eac3bfddb0f7df1a0aef7673d4f60607
-
SHA1
e9e3a3e76d3e30fc95bbeba24c5f7ec037422a2c
-
SHA256
7b34079bd9a762f625d6331d5871a6b51c837f92c941908715826f7b2f990971
-
SHA512
f52cbfecd27ed1fea011ab8adf0a03a5887a4b37733a41f7a6612f84dc5e44088a94c7216373e9ce399a34a8d894891438d20e75fc33f58cffb37fde08355220
-
SSDEEP
768:tKSCquFw0GQa+7R4f3dwx1oXgmm5L+eNDXSdWgOYQ43H:3CquFw0GQJSfd2z4eNDX+WYQm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2972 2488 regsvr32.exe 89 PID 2488 wrote to memory of 2972 2488 regsvr32.exe 89 PID 2488 wrote to memory of 2972 2488 regsvr32.exe 89
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eac3bfddb0f7df1a0aef7673d4f60607_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\eac3bfddb0f7df1a0aef7673d4f60607_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵PID:2224