Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 21:12
Behavioral task
behavioral1
Sample
JaffaCakes118_53a31b424659529fdc64ebc405aa39cf.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_53a31b424659529fdc64ebc405aa39cf.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_53a31b424659529fdc64ebc405aa39cf.dll
-
Size
10.3MB
-
MD5
53a31b424659529fdc64ebc405aa39cf
-
SHA1
d45bad1a0f78b07ceef6ab903f7cec697e89c872
-
SHA256
5ee3431ef4fbbf379df38264492748a07331b5ed758c6622e2ea3e5f6f42ba72
-
SHA512
c72794c166c22ec1196da740287c1d6f3c6b9fe63ff2adc3b5f42eefa1e15eb051f2233b6587c444164a71f34bdb89ea5135c5d38209d01333b1a2221c7fc1ac
-
SSDEEP
6144:llQwz8BDpWwOkA1CqwTuTlQwz8BDpWwOkA1CqwTu2:lOBl8kVFTuTOBl8kVFTu2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 2592 456 rundll32.exe 86 PID 456 wrote to memory of 2592 456 rundll32.exe 86 PID 456 wrote to memory of 2592 456 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53a31b424659529fdc64ebc405aa39cf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53a31b424659529fdc64ebc405aa39cf.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2592
-