Analysis
-
max time kernel
124s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 00:57
Behavioral task
behavioral1
Sample
JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e.dll
-
Size
109KB
-
MD5
54500d17c03abef7c0c0c4746d45ed9e
-
SHA1
149392eef8bd74264651c2dd3358e69865acc3e4
-
SHA256
2eb2fd29aadfcf6e8b3a0fd507f4c6b9655374e4728b8792bba97a1f290884f0
-
SHA512
0077d5e137d1016e940d756a490b48e56c9f1b40e2d1dacc22ea9b0aea7ee4a0677e4f82e03fc57984dba01669aef01b121f800a9a9bbbd4d23e4474e6882a69
-
SSDEEP
1536:tm4cgo72OAPGj4QOncz5OQXcsXzfCeUdd17AflOWa/MslOW2hJ6:k4nOAe9gcNOQXbXTCeUd7Aflo/MslsJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3428 2748 rundll32.exe 88 PID 2748 wrote to memory of 3428 2748 rundll32.exe 88 PID 2748 wrote to memory of 3428 2748 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_54500d17c03abef7c0c0c4746d45ed9e.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3428
-