Analysis
-
max time kernel
94s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
03524762652e9d627924251e008f119e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03524762652e9d627924251e008f119e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
03524762652e9d627924251e008f119e_JaffaCakes118.dll
-
Size
17KB
-
MD5
03524762652e9d627924251e008f119e
-
SHA1
00e2ef131c39c39f53bbd985c4b222f109a14d9c
-
SHA256
e06b74344fbcabd46b165962e82e75d216b2d4d078b28f3596c522b149644941
-
SHA512
a1645ee8b341f5c3e671605adb1d685b77c1c589b7eb176a1ebba824d9d4b841279491d27f81177c8176881e3773d89c77bcdf728db6a54f3b6f1542ad8df8e2
-
SSDEEP
384:JAjJwnH9vBu9RdP5EZpWo+dxpTwQ9H2JDH5/yBMDAQk:JwJka5EvWo6xoJDZaB2AQ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3296 2080 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 2080 3680 regsvr32.exe 82 PID 3680 wrote to memory of 2080 3680 regsvr32.exe 82 PID 3680 wrote to memory of 2080 3680 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\03524762652e9d627924251e008f119e_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\03524762652e9d627924251e008f119e_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 6603⤵
- Program crash
PID:3296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2080 -ip 20801⤵PID:1832