Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 00:58
Behavioral task
behavioral1
Sample
JaffaCakes118_4a2ef35a89ec85501cc8796a0e0149f1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4a2ef35a89ec85501cc8796a0e0149f1.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4a2ef35a89ec85501cc8796a0e0149f1.dll
-
Size
124KB
-
MD5
4a2ef35a89ec85501cc8796a0e0149f1
-
SHA1
76b71a978fb1220bcf7617581da2a1bccdd065f4
-
SHA256
2ef8fa887fbf0f9b8f5fcc4514ac3799d0983a52b07f97c31d3414c10f35ae3f
-
SHA512
ac987a43b0e876d17c3ea36c1ada2414898e02dab1538d141a9fb3abece04bcda3a9d704d58ac2a632cd503f32d1827afa90b375a669d5ee0a711f8fda095d26
-
SSDEEP
3072:RJfw+RNqbw9jZpqs0yC5BYavygQ6FLvwt:To+RNqbwBWqC5CCtQ6FLvO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 432 wrote to memory of 2268 432 rundll32.exe 87 PID 432 wrote to memory of 2268 432 rundll32.exe 87 PID 432 wrote to memory of 2268 432 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a2ef35a89ec85501cc8796a0e0149f1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4a2ef35a89ec85501cc8796a0e0149f1.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2268
-