Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 00:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_617011f1c02b516e0d2ab3eb44bc3d13.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_617011f1c02b516e0d2ab3eb44bc3d13.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_617011f1c02b516e0d2ab3eb44bc3d13.dll
-
Size
347KB
-
MD5
617011f1c02b516e0d2ab3eb44bc3d13
-
SHA1
cf979f94a9bbcaf97a3f0e7964e564e4e2278f66
-
SHA256
ffb8de7e05e5b2e1bb051801fb2518b041ad885a52899c0e2f3f0211b6f1804a
-
SHA512
1669faf4814ab0abbb2275a7734faa57d8047f72bc9a58f598da2c289cead65d918566959053734e2ab6e8d750bb802f534aad0f06b7a5a085deb7b5a4de9a15
-
SSDEEP
6144:OhlE9IW+WQyKL8ze3i8VGHoilgsEHb2pjth7ql:YHmP2bVcXjEH4hp4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3956 2020 rundll32.exe 83 PID 2020 wrote to memory of 3956 2020 rundll32.exe 83 PID 2020 wrote to memory of 3956 2020 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_617011f1c02b516e0d2ab3eb44bc3d13.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_617011f1c02b516e0d2ab3eb44bc3d13.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3956
-