Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 01:16
Behavioral task
behavioral1
Sample
JaffaCakes118_3ce865f4ddd2b3d5fd089c63f1e0a805.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3ce865f4ddd2b3d5fd089c63f1e0a805.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3ce865f4ddd2b3d5fd089c63f1e0a805.dll
-
Size
114KB
-
MD5
3ce865f4ddd2b3d5fd089c63f1e0a805
-
SHA1
e65efd74c9cb6d3f0f545a440480ad401ce616f3
-
SHA256
02d2b9857f10b2bcb97505110721d3c20198868ea3a67d437b12acacb353387f
-
SHA512
6e0e37f3d1b2668f6123a682b18edb5fa8e3fb46dfd15b0ec4ca76170f20db7c66911aa9552dec6bf52d54d1faa9a472a374782729cf82e1341967c68adaec78
-
SSDEEP
3072:IdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KxiCbmN:Mpl2GkGMkSgb8Svlu5KxON
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{dlhemzhb-uolf-kzeu-ucfl-jbaqhjvexlax} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{dlhemzhb-uolf-kzeu-ucfl-jbaqhjvexlax}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{dlhemzhb-uolf-kzeu-ucfl-jbaqhjvexlax}\stubpath = "þÿÿÿX" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1444 2316 rundll32.exe 31 PID 2316 wrote to memory of 1444 2316 rundll32.exe 31 PID 2316 wrote to memory of 1444 2316 rundll32.exe 31 PID 2316 wrote to memory of 1444 2316 rundll32.exe 31 PID 2316 wrote to memory of 1444 2316 rundll32.exe 31 PID 2316 wrote to memory of 1444 2316 rundll32.exe 31 PID 2316 wrote to memory of 1444 2316 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ce865f4ddd2b3d5fd089c63f1e0a805.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ce865f4ddd2b3d5fd089c63f1e0a805.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:1444
-