Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
fb36202fc19dfd9950a2002d87016f23_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb36202fc19dfd9950a2002d87016f23_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb36202fc19dfd9950a2002d87016f23_JaffaCakes118.dll
-
Size
409KB
-
MD5
fb36202fc19dfd9950a2002d87016f23
-
SHA1
4c434bd120c920cec1c9dfd2465193b8379387f4
-
SHA256
1d483aeaf909309bfc022eeb5867ca4ce7f505afef183f3de7a4b9d64dc95ef8
-
SHA512
e12646e51517a8a28df7700178c902e7b1b7a5eebdc31ae5a858a0472071b32ee0b492668a6e5b6fa5b096611d941dc5274b0cdfc6e40427d658ffb308261640
-
SSDEEP
12288:IPE97KChNOnbTzquTt4qYzpN769N5tRTItWIy:IPEhKChNOnbTttoNUPoy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4420 4124 regsvr32.exe 83 PID 4124 wrote to memory of 4420 4124 regsvr32.exe 83 PID 4124 wrote to memory of 4420 4124 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fb36202fc19dfd9950a2002d87016f23_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\fb36202fc19dfd9950a2002d87016f23_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:4420
-