Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2cff647db4b5d1f2b14736ecbb6a262.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2cff647db4b5d1f2b14736ecbb6a262.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2cff647db4b5d1f2b14736ecbb6a262.dll
-
Size
48KB
-
MD5
e2cff647db4b5d1f2b14736ecbb6a262
-
SHA1
8210c134174ea01be9d1831279c6e8e1f1fdca2d
-
SHA256
7a3aeefab9f1780a132a3d3e2378ebd338b5f49083cb116a93caa90be7fa0518
-
SHA512
5b11c7f17344301a24e02d8831a22561ebbd30019a348abff5c8f8db3e0d0e11695d4ccdd485adb4b5fcf7c508fe823a9fd2543a2ca5a07c0b9ce0c153da88cc
-
SSDEEP
768:tjeBCxOBZhzVocTz4OednT18idiI0ZkM0INq7CfP3VfTcbpAnSVuPEJ:tj7xOBrznz4Oedn58i+Z7XfPlriA5EJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3300 4972 rundll32.exe 82 PID 4972 wrote to memory of 3300 4972 rundll32.exe 82 PID 4972 wrote to memory of 3300 4972 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2cff647db4b5d1f2b14736ecbb6a262.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2cff647db4b5d1f2b14736ecbb6a262.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3300
-