Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 16:29
Static task
static1
Behavioral task
behavioral1
Sample
0249d9e0fe3b377c728644612c12e54f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0249d9e0fe3b377c728644612c12e54f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0249d9e0fe3b377c728644612c12e54f_JaffaCakes118.dll
-
Size
18KB
-
MD5
0249d9e0fe3b377c728644612c12e54f
-
SHA1
96d31640cb0ca5bcb9d719d8b94a54d2ffbc72d2
-
SHA256
ca1adbac60b1a84cff4206e2a608ff423a9b685a9a3032fdcfe8a5e29ee3a132
-
SHA512
0c76a8c418cee9b8a763e3739adb255a82c1582d94a568d6b0c78d9a215e53e443168bd180e18841cae170d7af4a878493b740a87876e4e2c2b79987e0159b72
-
SSDEEP
384:dlm8ILnaA+sH4+bYx8nd5tebfPEGZfGpgKShXqF2eLeHi6sCB1:nILnaVt8d5cIG0g02e0i6X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2860 regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2860 1780 regsvr32.exe 31 PID 1780 wrote to memory of 2860 1780 regsvr32.exe 31 PID 1780 wrote to memory of 2860 1780 regsvr32.exe 31 PID 1780 wrote to memory of 2860 1780 regsvr32.exe 31 PID 1780 wrote to memory of 2860 1780 regsvr32.exe 31 PID 1780 wrote to memory of 2860 1780 regsvr32.exe 31 PID 1780 wrote to memory of 2860 1780 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0249d9e0fe3b377c728644612c12e54f_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0249d9e0fe3b377c728644612c12e54f_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860
-