Analysis
-
max time kernel
89s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 18:29
Behavioral task
behavioral1
Sample
JaffaCakes118_5aa187267c757704cb1e67cd7728799a.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5aa187267c757704cb1e67cd7728799a.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5aa187267c757704cb1e67cd7728799a.dll
-
Size
796KB
-
MD5
5aa187267c757704cb1e67cd7728799a
-
SHA1
93111df14ee24f5de3ff379ace5e54826c4f7aeb
-
SHA256
9f2fe7387d1ba0e3e86ade764415a2e44b4ab22fb22869eb1b73f21b205efa4d
-
SHA512
58416cf275e70f53f101c0550f2e4d5cb915277c5003f5dcab9688d10d754b33851eb629e597bd399bdb9e88c30e436f8578d5d9aef0865d6d0df270a928b30d
-
SSDEEP
3072:qXVBvlioGk02A7FM4BBt4BmQz6DATBftgJFGbIzYH0BtF9PPpt:qXPwoN6BBtenYATBlgzTq05Rpt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4052 4072 regsvr32.exe 85 PID 4072 wrote to memory of 4052 4072 regsvr32.exe 85 PID 4072 wrote to memory of 4052 4072 regsvr32.exe 85
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5aa187267c757704cb1e67cd7728799a.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5aa187267c757704cb1e67cd7728799a.dll2⤵
- System Location Discovery: System Language Discovery
PID:4052
-