Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 13:45
Behavioral task
behavioral1
Sample
18556b03dd2fbb8c817f852eb5c83456_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
18556b03dd2fbb8c817f852eb5c83456_JaffaCakes118.dll
-
Size
30KB
-
MD5
18556b03dd2fbb8c817f852eb5c83456
-
SHA1
4445767717f807eb8b7998e62fb9ebc6d58cb463
-
SHA256
b5c59318585cdd096527d101e6e64710135e7c8e2af7d23e534fd4d4e2482d30
-
SHA512
f9c97f77b4ceb90f3506943f573a490d9b82e25d1f3f48ab98082ef34e7246f4a72f4d9207f5c715f60e55fcbbe0ba947b6fd7a8243d91f2f26508b71bf1bab6
-
SSDEEP
768:gOUANfS5GXtmD0NvNP9ZJLwrH11eJrtLJFADrt2I9w+:gOkWm45h9ZJLCbethQDrthw+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1692-0-0x0000000010000000-0x000000001001C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4260 wrote to memory of 1692 4260 regsvr32.exe 82 PID 4260 wrote to memory of 1692 4260 regsvr32.exe 82 PID 4260 wrote to memory of 1692 4260 regsvr32.exe 82
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\18556b03dd2fbb8c817f852eb5c83456_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\18556b03dd2fbb8c817f852eb5c83456_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:1692
-