Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
f66124fdbcd7daaf292973404d122e43_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f66124fdbcd7daaf292973404d122e43_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f66124fdbcd7daaf292973404d122e43_JaffaCakes118.dll
-
Size
172KB
-
MD5
f66124fdbcd7daaf292973404d122e43
-
SHA1
febdcfc15d41f4eb80142337f3b96180eb017d24
-
SHA256
77f68d5650b68bc4ce25a0f1cf873a3882056701d8f0bb10294506034f4168f0
-
SHA512
6f0c95a76e9a8dbd108e0d015d9da64a19056155b10292c372b88d84f1ad9588475ef2360180c7240cd3448db170a5ea2adcd26596fc306575c2287af5a2b673
-
SSDEEP
3072:2AICVEzP+aeqS75yqzpRQfp/XoNdAf24MEBJTOHXTyn0:h6H2yqVoQAftMEPOHXTyn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 264 wrote to memory of 2372 264 regsvr32.exe 82 PID 264 wrote to memory of 2372 264 regsvr32.exe 82 PID 264 wrote to memory of 2372 264 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\f66124fdbcd7daaf292973404d122e43_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\f66124fdbcd7daaf292973404d122e43_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2372
-