Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 11:55
Behavioral task
behavioral1
Sample
JaffaCakes118_51f3a99d94282be34797260b15ac6720.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_51f3a99d94282be34797260b15ac6720.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_51f3a99d94282be34797260b15ac6720.dll
-
Size
78KB
-
MD5
51f3a99d94282be34797260b15ac6720
-
SHA1
cfe6c9cc7c150c6f82f50733a27b2b58b478d01e
-
SHA256
ec8134ae783963fd0fbcb8e493bdef4659c4c694a0027efa9395f4a30c19c53f
-
SHA512
1ccaf921519be0b29613b3d36ddd0e89324341eafae5e36855ba006d9e757407067cc550756862efa2f19e7fadc3e1ba6799d9c8b30112e0b9237276f3f6c8ec
-
SSDEEP
768:xXCpOFUwEyKp56eJZUiY7fCqBxLmMeAGcCNuhZ4O5ZfSxMOeetPasP0dSKyJxPli:1475lJZUb/LmHcZ4OfSxMOegrcsZi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 2404 4584 rundll32.exe 86 PID 4584 wrote to memory of 2404 4584 rundll32.exe 86 PID 4584 wrote to memory of 2404 4584 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51f3a99d94282be34797260b15ac6720.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51f3a99d94282be34797260b15ac6720.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2404
-