Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
01df2c53b876b059ad957d2524da8d58_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01df2c53b876b059ad957d2524da8d58_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
01df2c53b876b059ad957d2524da8d58_JaffaCakes118.dll
-
Size
40KB
-
MD5
01df2c53b876b059ad957d2524da8d58
-
SHA1
3b20d0dcb691d73433609a18d1fa49038939c0e1
-
SHA256
c0bf06a91c44f0c58576d33c85a1cb76d5f5e38ff5fcad22f7efb468e648606d
-
SHA512
03978ae0a223ef00723710bdf1abc2c23ca0ad6b02b995205e95a83819ae46ede6e11bbd35d62d8da04ba5ffb409404d934c76432ac4341aecc9aeaa3b5ade02
-
SSDEEP
768:S5/Kp0Is86sCk9U+pkavp6D/kumlT6gLa1At8efM:SCEiUNSZnLaWt10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3844 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3844 Rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3980 wrote to memory of 4076 3980 regsvr32.exe 82 PID 3980 wrote to memory of 4076 3980 regsvr32.exe 82 PID 3980 wrote to memory of 4076 3980 regsvr32.exe 82 PID 4076 wrote to memory of 3844 4076 regsvr32.exe 83 PID 4076 wrote to memory of 3844 4076 regsvr32.exe 83 PID 4076 wrote to memory of 3844 4076 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\01df2c53b876b059ad957d2524da8d58_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\01df2c53b876b059ad957d2524da8d58_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\system32\Rundll32.exe C:\Users\Admin\AppData\Local\Temp\01df2c53b876b059ad957d2524da8d58_JaffaCakes118.dll,DllUnregisterServer3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3844
-
-