Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
08477b47644a3b36b900cf7ad27fc276_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08477b47644a3b36b900cf7ad27fc276_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
08477b47644a3b36b900cf7ad27fc276_JaffaCakes118.dll
-
Size
588KB
-
MD5
08477b47644a3b36b900cf7ad27fc276
-
SHA1
2c2f317ea91518c1d85a0b04bd0eebe2f55fd704
-
SHA256
bb73c5e2f9882ee284422e4b32137c401a68407636b018eeb1ebba89c159cf72
-
SHA512
d299dca81923d648766040e3e86a03fbe3b1143ed0a0fff127794a32ff30e41449dd59817e80ec2645488625ac2b53b46ec3cb83c4f2e1fbbbe71c361dcc584a
-
SSDEEP
768:NDRs4+d6Yi20XZ9hAVZqtKIZ+2fJcwqVETAz4HMBbsjjRGPZMoKV:fsHi2iGZDIZ+nVETAzFs1fo+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2380 4064 regsvr32.exe 82 PID 4064 wrote to memory of 2380 4064 regsvr32.exe 82 PID 4064 wrote to memory of 2380 4064 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\08477b47644a3b36b900cf7ad27fc276_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\08477b47644a3b36b900cf7ad27fc276_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2380
-