Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 16:32
Behavioral task
behavioral1
Sample
JaffaCakes118_41909ca1041688fc4e164f49ac49f671.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_41909ca1041688fc4e164f49ac49f671.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_41909ca1041688fc4e164f49ac49f671.dll
-
Size
36KB
-
MD5
41909ca1041688fc4e164f49ac49f671
-
SHA1
3f960dffb882bfa6fb72df3ef75ea286dc798c63
-
SHA256
0bbf4cf0a14dca38afbdbf864c69c14903c5c8a49269d397623695134fb6f315
-
SHA512
c0a6c006a97c79a570cc01fc88cc50590cfd2d63a609d981df99c6429efae42ca91b0ba7a0cdf2ac2feb732e84c4238ac999e02c8e4fea64a396b97e4f702e49
-
SSDEEP
384:2fksDfZr0jpT2VDcUHVkuGLCyrMZwKjUOatTwMSp9Cpv9uGXO:2fkMr0ROPpGLCyAZwsUdw7SYGX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 1232 220 rundll32.exe 83 PID 220 wrote to memory of 1232 220 rundll32.exe 83 PID 220 wrote to memory of 1232 220 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41909ca1041688fc4e164f49ac49f671.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_41909ca1041688fc4e164f49ac49f671.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1232
-