Analysis
-
max time kernel
127s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 02:09
Behavioral task
behavioral1
Sample
JaffaCakes118_3d2b32ee55670d089232d74b108886e5.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3d2b32ee55670d089232d74b108886e5.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3d2b32ee55670d089232d74b108886e5.dll
-
Size
111KB
-
MD5
3d2b32ee55670d089232d74b108886e5
-
SHA1
0d4711162e497c626cf42c441b4bf13d21e7b853
-
SHA256
91eaa018d884f0ac9f42a4815cdc2812bc537e02eadce048f69815ebdeab67d5
-
SHA512
1081cca693831eae21afffba003a593d44bec5cd2c706659375725f234d7b19dad7514b2f1f1aa84d4ca8c54d6b333730d8db3966014b86372d69da5d2bf0d70
-
SSDEEP
1536:R5UfVZv6h9jo2rql+ERXuSclSFfL3eoxta2OMdj3KdQl:R5UP6hKRXuS6S9L3e2ta2OMdj3K4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 884 220 regsvr32.exe 87 PID 220 wrote to memory of 884 220 regsvr32.exe 87 PID 220 wrote to memory of 884 220 regsvr32.exe 87
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d2b32ee55670d089232d74b108886e5.dll1⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3d2b32ee55670d089232d74b108886e5.dll2⤵
- System Location Discovery: System Language Discovery
PID:884
-