Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
36750e369f5f9817763d5b03548bd635_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
36750e369f5f9817763d5b03548bd635_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
36750e369f5f9817763d5b03548bd635_JaffaCakes118.dll
-
Size
386KB
-
MD5
36750e369f5f9817763d5b03548bd635
-
SHA1
9771eff86314de86df81eff7c812941cdac32eb8
-
SHA256
7ad06e53ef711594c384d52920f854fdb9e23c8d2d8e1336d3f034d36c450b89
-
SHA512
bfc2b1f87e13b8edd8a1dc26acf7c61fe81ee3901c6c6e358b7617bb6529eef42e0bcbc55f7e1dc932715b7cca25b06477edb6426006510bbe591de228d5f148
-
SSDEEP
3072:scWOH8ByA7OQDJPn6LEeH32BOiACd2GDafSySxo8eih1EBmlOxZ7OyEoS52I6KW/:kOqo7H32BOiSKafS1eikBuOxZOSeu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2880 1704 regsvr32.exe 83 PID 1704 wrote to memory of 2880 1704 regsvr32.exe 83 PID 1704 wrote to memory of 2880 1704 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\36750e369f5f9817763d5b03548bd635_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\36750e369f5f9817763d5b03548bd635_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2880
-