Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 04:04
Behavioral task
behavioral1
Sample
JaffaCakes118_52863bfa9c72c14f2d51e2c2ba76c374.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_52863bfa9c72c14f2d51e2c2ba76c374.dll
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_52863bfa9c72c14f2d51e2c2ba76c374.dll
-
Size
122KB
-
MD5
52863bfa9c72c14f2d51e2c2ba76c374
-
SHA1
c41f21edfc7767fdf5bc2651cdcb66d944910a18
-
SHA256
a574c882b51dd50d8dc341a8e352cc0acca6ded44726c6d1ec814dfcef2871c2
-
SHA512
d47cc138e9e8bc768c0be926a5d83e5e637668e828b762a28bd1c5d774ea6f6c7adbd01277417d8e92c2b3d1cae1eb6c1824eb1860b0d6907c4595724cca4bd7
-
SSDEEP
1536:+jAZuGYnFriOOkqiIEPm4ectSLfL3e/H6n2OMOVdup4OTLCLzQ:+jAsnNfPm4eaSbL3efI2OMOVM2A
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4712 3660 regsvr32.exe 83 PID 3660 wrote to memory of 4712 3660 regsvr32.exe 83 PID 3660 wrote to memory of 4712 3660 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_52863bfa9c72c14f2d51e2c2ba76c374.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_52863bfa9c72c14f2d51e2c2ba76c374.dll2⤵
- System Location Discovery: System Language Discovery
PID:4712
-