Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 20:53

General

  • Target

    JaffaCakes118_4396db7a1d3c41b0333e487f0fa11868.dll

  • Size

    147KB

  • MD5

    4396db7a1d3c41b0333e487f0fa11868

  • SHA1

    af5aa0eb1b8351c519e8ef0b203ebd7c560fff50

  • SHA256

    6c7ca6f35472bbe6ce9dd03fcb3c70155f2eb1c92d88d8c1f5dacb8b31daa00b

  • SHA512

    12fbead1a66174feabb72a689168e28559f7155fe942cffc28011ea97769c15ed566a8fc7bf900a91919cc1fb0a3edef66dc1331b72ceff963d2e3fd0d97925d

  • SSDEEP

    3072:5ODZGx4N+MIcFbeC8qP1bEtYn1TjeGna3wCkqFDHYvSiAoX4:Egx4NnVbGqPqKFqSvSiW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4396db7a1d3c41b0333e487f0fa11868.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4396db7a1d3c41b0333e487f0fa11868.dll
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\SysWOW64\regsvr32mgr.exe
        C:\Windows\SysWOW64\regsvr32mgr.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 156
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RGI9D0A.tmp

    Filesize

    802B

    MD5

    f43aa15b8b94400fd85a33484b4ce010

    SHA1

    7246e1f9826a750992b172b485e132fc38936019

    SHA256

    d1771866468bd3b9cf3db9c40f4031e266d858aac2e5ef11b412e6df6dd297f4

    SHA512

    e155d2de65e067173276658691e67e44b83d0f20e3959dad558c58682da66b674934106f1b271046f92d0e020c06222cc6719e2bc78a0a9117ab46ac1d2bbe73

  • \Windows\SysWOW64\regsvr32mgr.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350

  • memory/2476-1-0x000000006CDF0000-0x000000006CE19000-memory.dmp

    Filesize

    164KB