Analysis

  • max time kernel
    89s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 18:29

General

  • Target

    JaffaCakes118_5aa187267c757704cb1e67cd7728799a.dll

  • Size

    796KB

  • MD5

    5aa187267c757704cb1e67cd7728799a

  • SHA1

    93111df14ee24f5de3ff379ace5e54826c4f7aeb

  • SHA256

    9f2fe7387d1ba0e3e86ade764415a2e44b4ab22fb22869eb1b73f21b205efa4d

  • SHA512

    58416cf275e70f53f101c0550f2e4d5cb915277c5003f5dcab9688d10d754b33851eb629e597bd399bdb9e88c30e436f8578d5d9aef0865d6d0df270a928b30d

  • SSDEEP

    3072:qXVBvlioGk02A7FM4BBt4BmQz6DATBftgJFGbIzYH0BtF9PPpt:qXPwoN6BBtenYATBlgzTq05Rpt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5aa187267c757704cb1e67cd7728799a.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5aa187267c757704cb1e67cd7728799a.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads