Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
0299c626a6d29a9cdb2e341a89bb2bc7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0299c626a6d29a9cdb2e341a89bb2bc7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0299c626a6d29a9cdb2e341a89bb2bc7_JaffaCakes118.dll
-
Size
128KB
-
MD5
0299c626a6d29a9cdb2e341a89bb2bc7
-
SHA1
77f0e5fed979eaee7107258a313bd8bf2316dcab
-
SHA256
add2f3af0924fe3f5007e3303ca1669404a25dfd067202bcb9e5d77c26631f77
-
SHA512
1064abe4c1e84cda7e2c043e5e7d5585254ade9522aca930083ca515fda7e49ade8e9a79117f58dfc41bcbf67bd6d5419149b790b678c3f2f35750e89bfce12c
-
SSDEEP
768:H2fCZqoQO8obQ0xJTK229keAdhrIohbtyN17a7XOueWHCf3qKUihcoJHO9Udmnd:HrZqoQybQ6Thhr1bc17azHA6BKr89UW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3928 wrote to memory of 3128 3928 regsvr32.exe 82 PID 3928 wrote to memory of 3128 3928 regsvr32.exe 82 PID 3928 wrote to memory of 3128 3928 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\0299c626a6d29a9cdb2e341a89bb2bc7_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\0299c626a6d29a9cdb2e341a89bb2bc7_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:3128
-