Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
3812a0553ef828f7504f9f91db605f17_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3812a0553ef828f7504f9f91db605f17_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3812a0553ef828f7504f9f91db605f17_JaffaCakes118.dll
-
Size
22KB
-
MD5
3812a0553ef828f7504f9f91db605f17
-
SHA1
810a1d192ee97627eb1403f7397d2a18c0a7ec41
-
SHA256
c9b6394a6a4bd2402720dd1b74f480248b4d685f48f003d8aee66c95bcd27d51
-
SHA512
b427d13c26360f87fecab7b642ffec2bc3e88917eedce2251b40f7295048d4edb94fb38530898ec4e92079c6891266cdf6d0fdab90e2ff8a1a71bd1d982c3fba
-
SSDEEP
384:CWeHd2vDIdFJG98WDq/Z5EEE8X/dY8TG40pKx7CSRgQZpzIzRpyTEcGmdmU:A924sChRlu/npKx+SRgQZBqpyTEZm7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2416 4408 regsvr32.exe 83 PID 4408 wrote to memory of 2416 4408 regsvr32.exe 83 PID 4408 wrote to memory of 2416 4408 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3812a0553ef828f7504f9f91db605f17_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3812a0553ef828f7504f9f91db605f17_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:2416
-