Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 20:59
Behavioral task
behavioral1
Sample
JaffaCakes118_4921e2a2639145e5861e68511dfd1753.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4921e2a2639145e5861e68511dfd1753.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4921e2a2639145e5861e68511dfd1753.dll
-
Size
114KB
-
MD5
4921e2a2639145e5861e68511dfd1753
-
SHA1
b23a363184edb0e80237ef4bd826a60a4d506f21
-
SHA256
5418940de003b2d8957e9dcbb5e15db7adac71422dd28d20b70b17ceabfc49a0
-
SHA512
34c0767492f779ed794296e9d6a4af1fe1868e2c0ec2a9930723561c702ad6e6d4fead712cc0b300055c4987c3def60307ba97ee9e9af7a0489bd8e0dab5d7e6
-
SSDEEP
3072:IdpgMxsdSyg4TvtcMk8Lyzb8ckivlu5KciCbmN:Mpl2GkGMkSgb8Svlu5KcON
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{qmbxjyvc-pdor-yode-wggm-jfhkppeqfejh}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{qmbxjyvc-pdor-yode-wggm-jfhkppeqfejh}\stubpath rundll32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{qmbxjyvc-pdor-yode-wggm-jfhkppeqfejh} rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2860 wrote to memory of 4216 2860 rundll32.exe 86 PID 2860 wrote to memory of 4216 2860 rundll32.exe 86 PID 2860 wrote to memory of 4216 2860 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4921e2a2639145e5861e68511dfd1753.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4921e2a2639145e5861e68511dfd1753.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:4216
-