Analysis
-
max time kernel
94s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 03:35
Behavioral task
behavioral1
Sample
JaffaCakes118_50538b7588f670ec3f8fd08bcf2f343e.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_50538b7588f670ec3f8fd08bcf2f343e.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_50538b7588f670ec3f8fd08bcf2f343e.dll
-
Size
112KB
-
MD5
50538b7588f670ec3f8fd08bcf2f343e
-
SHA1
ffce69e16a4b862de2899714e032a2e4a6ae8cf4
-
SHA256
22acab09d3f57fd2103d7fb0060876c74fb6207010b58ee753ee33a47df79ef7
-
SHA512
aaa17aa8e0b0c440593676e709522519521f41864fdeddc0633bb9407baa9a1152528cb1eca85a0932489c5ae4c6ce87a73078eea82a4c58a32f2d0b339539ec
-
SSDEEP
3072:ZkdJv5hMFULTvtcMC8LyjH8lkivlD5KXSITqf:iJRG4GMCSQH8TvlD5KXSIef
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{cra52uqw-h7ev-r325-6t72-v82nt0f6nc9n} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{cra52uqw-h7ev-r325-6t72-v82nt0f6nc9n}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{cra52uqw-h7ev-r325-6t72-v82nt0f6nc9n}\stubpath rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 1828 116 rundll32.exe 84 PID 116 wrote to memory of 1828 116 rundll32.exe 84 PID 116 wrote to memory of 1828 116 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50538b7588f670ec3f8fd08bcf2f343e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50538b7588f670ec3f8fd08bcf2f343e.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:1828
-