Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 12:27
Behavioral task
behavioral1
Sample
JaffaCakes118_4addb4f3e04c66c86baca1912d1eab9a.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4addb4f3e04c66c86baca1912d1eab9a.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4addb4f3e04c66c86baca1912d1eab9a.dll
-
Size
116KB
-
MD5
4addb4f3e04c66c86baca1912d1eab9a
-
SHA1
149bfed2f9eaaa9b6f3d0d63a08e25bdfb6d1704
-
SHA256
015de825749d8a55b37de3f2a47727aec0d80ac3b5cbaf61c94152e8d1584cca
-
SHA512
1e7178a542e1f9d8ec7e95de86b3634e3203c328b68e6e2b1a71afe0dabbe8a2dcee27e1f196bfe4dbbaf52199c1d4ef23ab19b1415c21c858931386454c98c1
-
SSDEEP
3072:phffwJwDSx1O+bj3MRkieeRf5++qqUG9t+x:phox3EkZIf5++qqZ/Q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1268 1832 rundll32.exe 30 PID 1832 wrote to memory of 1268 1832 rundll32.exe 30 PID 1832 wrote to memory of 1268 1832 rundll32.exe 30 PID 1832 wrote to memory of 1268 1832 rundll32.exe 30 PID 1832 wrote to memory of 1268 1832 rundll32.exe 30 PID 1832 wrote to memory of 1268 1832 rundll32.exe 30 PID 1832 wrote to memory of 1268 1832 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4addb4f3e04c66c86baca1912d1eab9a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4addb4f3e04c66c86baca1912d1eab9a.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1268
-