Analysis
-
max time kernel
131s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 03:53
Behavioral task
behavioral1
Sample
JaffaCakes118_3db305cae5799855e5d27e2b57c96560.dll
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3db305cae5799855e5d27e2b57c96560.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3db305cae5799855e5d27e2b57c96560.dll
-
Size
58KB
-
MD5
3db305cae5799855e5d27e2b57c96560
-
SHA1
4745dcc33e7559f5764f70ae59ab71762c24b425
-
SHA256
1346597824f9dcfa5307110ff1d42fd00d30ffa27b485041319f67d0c627055d
-
SHA512
e758ec2f8590e88da828cc7081ae7cc7b24c9f61e78217c400080492d839e286ec27d344d4fe5bc819d1f28ce6ed8fedda3e47b9264be5999a84d0ff5b7c630d
-
SSDEEP
768:evxZt2iHLDS/bo+6mI8GccN9hhtPvVfLUUOFxjM1z4D2DrHxPox:eJZ7SKDcmtVfLUUOFx+qsr2x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 1076 1048 rundll32.exe 84 PID 1048 wrote to memory of 1076 1048 rundll32.exe 84 PID 1048 wrote to memory of 1076 1048 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3db305cae5799855e5d27e2b57c96560.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3db305cae5799855e5d27e2b57c96560.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1076
-