Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
eaeb9605d8536cb84a396a6b41a20a80_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaeb9605d8536cb84a396a6b41a20a80_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eaeb9605d8536cb84a396a6b41a20a80_JaffaCakes118.dll
-
Size
156KB
-
MD5
eaeb9605d8536cb84a396a6b41a20a80
-
SHA1
05fb933040ef8ee0a8f894c84935a61ba8ab9cae
-
SHA256
802a42f41d4b9560860c71f9e796554d0c3ae09b5140aeb9e931b4ece58d1261
-
SHA512
fa507b0a795be50035d8c94adaf588fd39ebe5b461e3a131c2727c3df5b9eb5509763a0ac4cd5304350408112352d14247a0a06d822cc9e47369fdd4a16f7081
-
SSDEEP
3072:kIfi6M+yZ4KBQDw3QBpq3ynj6ARCPBr+MDRpu0gP+rpEhYRxAlu6:kN6M+yHceQBpq86ARCPJnmrSc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\Spy Protector\ = "{107A1D63-2EAA-4694-8ABA-EC209C630D83}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\Spy Protector regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\Spy Protector regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\Spy Protector regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{107A1D63-2EAA-4694-8ABA-EC209C630D83}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eaeb9605d8536cb84a396a6b41a20a80_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Directory\shellex regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{107A1D63-2EAA-4694-8ABA-EC209C630D83}\ = "Spy Protector Context Menu" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{107A1D63-2EAA-4694-8ABA-EC209C630D83}\InprocServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\*\shellex\ContextMenuHandlers regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\*\shellex\ContextMenuHandlers\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\Spy Protector\ = "{107A1D63-2EAA-4694-8ABA-EC209C630D83}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Directory\shellex\ContextMenuHandlers regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Directory\shellex\ContextMenuHandlers\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{107A1D63-2EAA-4694-8ABA-EC209C630D83} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\*\shellex\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\ regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Directory\shellex\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\Spy Protector\ = "{107A1D63-2EAA-4694-8ABA-EC209C630D83}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{107A1D63-2EAA-4694-8ABA-EC209C630D83}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\*\shellex regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3400 wrote to memory of 408 3400 regsvr32.exe 82 PID 3400 wrote to memory of 408 3400 regsvr32.exe 82 PID 3400 wrote to memory of 408 3400 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\eaeb9605d8536cb84a396a6b41a20a80_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\eaeb9605d8536cb84a396a6b41a20a80_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:408
-