Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
f5d8e190d5065007a5fc01e5c9912982_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5d8e190d5065007a5fc01e5c9912982_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f5d8e190d5065007a5fc01e5c9912982_JaffaCakes118.dll
-
Size
97KB
-
MD5
f5d8e190d5065007a5fc01e5c9912982
-
SHA1
6cbe2136dd66eba3bb2ffdf295c689af8a34b36e
-
SHA256
cac7dc344ea13031678965049aaf3b86f86714d352dcfb42963936aaa6cc6a52
-
SHA512
34c006f8777471f39bd90858c4639544628b250c2800111a2401685a20df456624000c8fdd85c3c36a35a6a00d12782446cacece84e652bf46863f3f4e111ad8
-
SSDEEP
1536:RMqzW7JoS7qxgY96riqT2KazWkokkkkkkotV74wooRxAGk:R5OK1bzWkokkkkkkcVUwooRxAG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 8 wrote to memory of 4884 8 regsvr32.exe 82 PID 8 wrote to memory of 4884 8 regsvr32.exe 82 PID 8 wrote to memory of 4884 8 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f5d8e190d5065007a5fc01e5c9912982_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f5d8e190d5065007a5fc01e5c9912982_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4884
-