Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll
-
Size
159KB
-
MD5
044ab8e914d63a8d58b19b1298f029b2
-
SHA1
3b76c72811530080aba015179f63c3d2297af88d
-
SHA256
6a79c744d175b81495780bd4b0a8d3dd010504e059080dbb522f96f2ab9daf9e
-
SHA512
30da5d808e07f427ecf696ce106906854c78549082d2160c7e4b75b32d8d9115647b12dc0a8428948ed9cd26f1712c457a32143a70087a746bab264a107f450e
-
SSDEEP
3072:W/a5C1c7pLxRtnQjrT6cyzCe9k3nQCpYBGNnI5uICD3F308RcgOmfo6LmuY:WCc1c7ZtQ2pCegZpUsT3R08igOyo6VY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478}\ = "MPV Decoder Filter" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7}\ = "CMpeg2DecPropertyPage" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{39F498AF-1A09-4275-B193-673B0BA3D478} regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{39F498AF-1A09-4275-B193-673B0BA3D478}\FilterData = 020000000200004002000000000000003070693300000000000000000600000000000000000000003074793300000000b0000000c00000003174793300000000d0000000c00000003274793300000000e0000000c00000003374793300000000f0000000c00000003474793300000000f0000000000100003574793300000000f0000000100100003170693308000000000000000100000000000000000000003074793300000000f0000000200100006a910bed4d04d111aa7800c04fc31d6026806de046dbcf11b4d100805f6cbbea133b5236e58ed1118ca30060b057664a20806de046dbcf11b4d100805f6cbbea7669647300001000800000aa00389b7180eb36e44f52ce119f530020af0ba77081eb36e44f52ce119f530020af0ba7704959555600001000800000aa00389b71 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{39F498AF-1A09-4275-B193-673B0BA3D478}\CLSID = "{39F498AF-1A09-4275-B193-673B0BA3D478}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39F498AF-1A09-4275-B193-673B0BA3D478}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E5FB6957-65E6-491B-BB37-B25C9FE3BEA7}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{39F498AF-1A09-4275-B193-673B0BA3D478}\FriendlyName = "MPV Decoder Filter" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2940 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2940 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2940 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2940 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2940 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2940 2360 regsvr32.exe 31 PID 2360 wrote to memory of 2940 2360 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\044ab8e914d63a8d58b19b1298f029b2_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2940
-