Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 18:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll
-
Size
39KB
-
MD5
4de02857155090988f1356e6ba1fc8ff
-
SHA1
479edb1217cf8f875bd209e654f0662c4a523a74
-
SHA256
ec5173d7ace5c184707345f0257a98e1d1bd7b306c9a43f9be3d271d7754cf1b
-
SHA512
094fe77c13dba7f1cfc48f2c1f5208ebdbbef1fa91bcaf8c9b3a47c9caf5da15614045e5882f8fba5049d478a78557ebd24db70bf59a273591b6a4c1dfc932cb
-
SSDEEP
768:AgO2PxPYdJE6aJ/tMfBSuvD93e0I/1jWF7lh67SfSHSk:AZ2PaE6eMBSuvAj6wrn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3916 4612 rundll32.exe 83 PID 4612 wrote to memory of 3916 4612 rundll32.exe 83 PID 4612 wrote to memory of 3916 4612 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4de02857155090988f1356e6ba1fc8ff.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3916
-