Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 04:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a5538abf08dea7ea3d38892c1cf6620.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6a5538abf08dea7ea3d38892c1cf6620.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6a5538abf08dea7ea3d38892c1cf6620.dll
-
Size
573KB
-
MD5
6a5538abf08dea7ea3d38892c1cf6620
-
SHA1
8c0e4b75f455e9d26bd0252126891d4fbf5a366f
-
SHA256
678868b0d661db2371a50165fd01806c5cd9435bd18d29cf09c9f9a6d5c0c5b1
-
SHA512
83fecb0ccaa1757ea055f6d9a6d2671ddf7d615de9d94bd6ba586214c1ddca6f61f5fbc83ed5922e40dbee828da218cb2073f8866c2c33e5e127c6d9e77fa622
-
SSDEEP
6144:eE3pV90gzsIHn+NzocVIsGesIIohL7197Ey076r1c8X/3vAgyy7CI/HQC+IIqumu:eGJckHsIQ7Iy0R8P3vmtIbS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1408 wrote to memory of 4660 1408 rundll32.exe 83 PID 1408 wrote to memory of 4660 1408 rundll32.exe 83 PID 1408 wrote to memory of 4660 1408 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a5538abf08dea7ea3d38892c1cf6620.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6a5538abf08dea7ea3d38892c1cf6620.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4660
-