Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 01:39
Behavioral task
behavioral1
Sample
JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0.dll
-
Size
66KB
-
MD5
4fe96af98b476226d43e4b82a290d4f0
-
SHA1
960678d02f2eced31b7ecab14c31176eb26d3811
-
SHA256
6c6a3da3801ea27ef09011c430b1b5277d0ca76f032c76e3a3a8939f6c645a57
-
SHA512
224ffd7737dbcf6570329ea21c836abe322730fe9e5a70958c6349eab5a23a166aca5fc89e02a335d4e2ce96c7989d0d151eb7d27839d4a17ee45404d1954ea7
-
SSDEEP
1536:B0GcsKvzlzMoQBcuw5fLhOSkrsKPSvGVj/Ov:B0GrKvl5QBdw5LhOVrsKPSvGVj/Ov
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3088 4828 rundll32.exe 87 PID 4828 wrote to memory of 3088 4828 rundll32.exe 87 PID 4828 wrote to memory of 3088 4828 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4fe96af98b476226d43e4b82a290d4f0.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3088
-