Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 01:33
Behavioral task
behavioral1
Sample
03e77e0d7011df691a95d2e807fffc04_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03e77e0d7011df691a95d2e807fffc04_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
03e77e0d7011df691a95d2e807fffc04_JaffaCakes118.dll
-
Size
57KB
-
MD5
03e77e0d7011df691a95d2e807fffc04
-
SHA1
9125899e77bbc511caecc1c0d2111dfac7c41046
-
SHA256
ea4846f8ee3b174be683374dd4075b7c6d1890178cb0e6175a5f2bcfeb12a6ea
-
SHA512
a4623ddb9d576bfe5d514c7d27f48f19d22f33ac6ee2314ea78cbc21ed424c2f0f4aad03af82a3128cb425255987c84486c726a3cb6e9e92903cc159e3d2b244
-
SSDEEP
768:LC0qiQf+Eb5GRILmCDYKfBzad6iHCjMAO+ge3IkZwmtJyZRe5l995jSHmHBZBAnb:u0qiQWEV5Jzad6iHCj/ONrk5sRexg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3940 wrote to memory of 1808 3940 regsvr32.exe 81 PID 3940 wrote to memory of 1808 3940 regsvr32.exe 81 PID 3940 wrote to memory of 1808 3940 regsvr32.exe 81
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\03e77e0d7011df691a95d2e807fffc04_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\03e77e0d7011df691a95d2e807fffc04_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:1808
-