Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 07:55
Behavioral task
behavioral1
Sample
JaffaCakes118_5137083ac628a4eb1e47bc3680b006a0.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5137083ac628a4eb1e47bc3680b006a0.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5137083ac628a4eb1e47bc3680b006a0.dll
-
Size
98KB
-
MD5
5137083ac628a4eb1e47bc3680b006a0
-
SHA1
796e12116f3aba6b7b646b691b1332fcb236f63e
-
SHA256
185b8a291e6f5a3d7077af211ba40b54eb4c08900ef2733842ac62fe8321f0e4
-
SHA512
9fb830d4819c72a5af9e78ab52424380db0f0bd46d94edb18c41c4a81ad038de67a4ebbaf36e58098795d0a02baf6e09fb2ff31bdfbc1ad83357e4bd9f6c3845
-
SSDEEP
3072:JOlZThpz7v7sbSxsvHpB+Et+hy4NNs+jzM3U:ED3XYOwpEo+hFNNs+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5137083ac628a4eb1e47bc3680b006a0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5137083ac628a4eb1e47bc3680b006a0.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2064
-