Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 03:38
Behavioral task
behavioral1
Sample
JaffaCakes118_524fd47a792a539e4af1ba3f40a2c051.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_524fd47a792a539e4af1ba3f40a2c051.dll
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_524fd47a792a539e4af1ba3f40a2c051.dll
-
Size
124KB
-
MD5
524fd47a792a539e4af1ba3f40a2c051
-
SHA1
f1047e9f0fabee3ca7de417ecc30fbc6e3cb39ec
-
SHA256
ae53069774d8a385ba27832884ae7bc49d11c4cc897c82cd7fa6dbb578a2aa08
-
SHA512
a204a48968d5e71d1a627eb7c8b319a6b28667913974f5f13056093d26097efc13d54da6259e149cc3bb8d13b4a8322d130b777a1e95f42dc87193735857db7f
-
SSDEEP
3072:AfHt+uPOJMEkGK4jmWIucchUYV5TVSOVlNWivx:wH7m+RGK4y0ckBzTMklNJx
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ˆ\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_524fd47a792a539e4af1ba3f40a2c051.dll" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2456 2460 rundll32.exe 29 PID 2460 wrote to memory of 2456 2460 rundll32.exe 29 PID 2460 wrote to memory of 2456 2460 rundll32.exe 29 PID 2460 wrote to memory of 2456 2460 rundll32.exe 29 PID 2460 wrote to memory of 2456 2460 rundll32.exe 29 PID 2460 wrote to memory of 2456 2460 rundll32.exe 29 PID 2460 wrote to memory of 2456 2460 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524fd47a792a539e4af1ba3f40a2c051.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_524fd47a792a539e4af1ba3f40a2c051.dll,#12⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
PID:2456
-