Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e26bb4db689fff47bf4f7ae0f0e32d72.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e26bb4db689fff47bf4f7ae0f0e32d72.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e26bb4db689fff47bf4f7ae0f0e32d72.dll
-
Size
224KB
-
MD5
e26bb4db689fff47bf4f7ae0f0e32d72
-
SHA1
00de58eba63b7eb84d0c7a1326e8f416d3306144
-
SHA256
194c291ebd6df03e65ec8d0a61815e13da9dc97151f7ee379a7b753543d7b237
-
SHA512
38f004c85e606bc908dcb3e848a8bef571a8b22f440ec99f81dba8ec517d4dcc42e8b32c584363869c40efd169bf7672c3b664874b95ce7e697fed7226abbbba
-
SSDEEP
6144:4J6N917yssJAYR7MwJyYDtSXvrVYKzNujZno:4J6X1770DR7DJbM/BYmeZno
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2092 2704 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2728 wrote to memory of 2704 2728 regsvr32.exe 30 PID 2728 wrote to memory of 2704 2728 regsvr32.exe 30 PID 2728 wrote to memory of 2704 2728 regsvr32.exe 30 PID 2728 wrote to memory of 2704 2728 regsvr32.exe 30 PID 2728 wrote to memory of 2704 2728 regsvr32.exe 30 PID 2728 wrote to memory of 2704 2728 regsvr32.exe 30 PID 2728 wrote to memory of 2704 2728 regsvr32.exe 30 PID 2704 wrote to memory of 2092 2704 regsvr32.exe 31 PID 2704 wrote to memory of 2092 2704 regsvr32.exe 31 PID 2704 wrote to memory of 2092 2704 regsvr32.exe 31 PID 2704 wrote to memory of 2092 2704 regsvr32.exe 31
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e26bb4db689fff47bf4f7ae0f0e32d72.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e26bb4db689fff47bf4f7ae0f0e32d72.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 2963⤵
- Program crash
PID:2092
-
-