Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 22:42
Behavioral task
behavioral1
Sample
0383e599a0411d0383518a909c1a0129_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0383e599a0411d0383518a909c1a0129_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0383e599a0411d0383518a909c1a0129_JaffaCakes118.dll
-
Size
730KB
-
MD5
0383e599a0411d0383518a909c1a0129
-
SHA1
6aae6dad2105785db1127b5fc473c219a8527505
-
SHA256
bcb994c5bbaad0a6752b562d7a84960e3e593c4176298ae914186f2999713741
-
SHA512
dac4a7537dd33d3c893a2e95006f64e98c8ca7f0d2bbbb57e747e881e878aac4e69f380be234db6fab1fad670ccb301572a9d5cc8d850f0da752dbe95f9100b8
-
SSDEEP
12288:rG7RYPrVGbbsTzLx+CEvb1Wot3phWV3P+LOm4Kq6xGJOpqxIfAIqr8wqquRJR:r4RYPr4PsjI8O3phWILOm4T0GkpjhqNS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\CMediaShell regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\CMediaShell\ = "{6B830884-20E3-4AB6-B672-2629F0F72071}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B830884-20E3-4AB6-B672-2629F0F72071} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B830884-20E3-4AB6-B672-2629F0F72071}\ = "CMediaShell" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B830884-20E3-4AB6-B672-2629F0F72071}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B830884-20E3-4AB6-B672-2629F0F72071}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\0383e599a0411d0383518a909c1a0129_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B830884-20E3-4AB6-B672-2629F0F72071}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3908 wrote to memory of 1452 3908 regsvr32.exe 82 PID 3908 wrote to memory of 1452 3908 regsvr32.exe 82 PID 3908 wrote to memory of 1452 3908 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0383e599a0411d0383518a909c1a0129_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0383e599a0411d0383518a909c1a0129_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1452
-