Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 12:53
Behavioral task
behavioral1
Sample
2ff59766210ba8aae066aecaaa228cff_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
2ff59766210ba8aae066aecaaa228cff_JaffaCakes118.dll
-
Size
18KB
-
MD5
2ff59766210ba8aae066aecaaa228cff
-
SHA1
dd66053c846da18b2b0402c338ce04aa5340dbae
-
SHA256
0236e7f26eb848d572ed43f638b7f27c867c8b2eb0bc6d98ba72b4165b88f72d
-
SHA512
dc3d4448599e46e2b68cdbe021ffbb86b654c6be61e5f70c7de35c7b522076946e601ac9d36d40ed38fb69e3657c1153d3d4e15ac11248117d14c839faca1a8e
-
SSDEEP
384:IPg62a0BCUnl2coNAcFEAoyTRXCzml83TAZxeDa4lS:J62aCCUngvNA3JyVlwUZczlS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2744-0-0x00000000004E0000-0x00000000004F2000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2744 4868 regsvr32.exe 84 PID 4868 wrote to memory of 2744 4868 regsvr32.exe 84 PID 4868 wrote to memory of 2744 4868 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2ff59766210ba8aae066aecaaa228cff_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2ff59766210ba8aae066aecaaa228cff_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2744
-