Analysis
-
max time kernel
96s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
36ffb1e577efadbeabd83fb2eec81fbc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36ffb1e577efadbeabd83fb2eec81fbc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
36ffb1e577efadbeabd83fb2eec81fbc_JaffaCakes118.exe
-
Size
38KB
-
MD5
36ffb1e577efadbeabd83fb2eec81fbc
-
SHA1
5c2c385563b8e0b6d3cd3672944cb19fb90b5ae1
-
SHA256
2737754e2a0dacf8fe18d1e1d76c40240e76fb71b05a535fe8eb5cad2e64b171
-
SHA512
a2973cd1879ea69f27a1f77d8026df7e14a55c9651a26fed094d919ea80a3db2d86a04276e3e45afdff44fa7ac423bc0bf05e957b27b4de242e39ec0b5dff991
-
SSDEEP
768:hmOCH4aeB5AL0g6MQg2FiCzHinn+WpzaK4ZPy8zhidfLNnZD:h8H4n500Rq8PsztSTMVLNZD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2612 2256 regsvr32.exe 83 PID 2256 wrote to memory of 2612 2256 regsvr32.exe 83 PID 2256 wrote to memory of 2612 2256 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\36ffb1e577efadbeabd83fb2eec81fbc_JaffaCakes118.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\36ffb1e577efadbeabd83fb2eec81fbc_JaffaCakes118.exe2⤵
- System Location Discovery: System Language Discovery
PID:2612
-