Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 05:32
Behavioral task
behavioral1
Sample
JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll
-
Size
122KB
-
MD5
5d51d749bd50bdfb08ca61c88818b570
-
SHA1
74643213faec1d2764e7ff6be4eb6c0f32bcff63
-
SHA256
883ebe97dd59f17235c08dcfb4431963ef2c50c0ab2cb53591d490ea095da5c5
-
SHA512
4441ca12ff824ce753dff330501d5d86fca15736294eae314d6af995c9f379c4926544e3a59da9e2e495d1c40f2fc341d21280a4c856c946265b05d3c4b083b4
-
SSDEEP
3072:of9xHwm1PXBmXZFeA28pMGEdePl9dehiv80P80Cnp8d6a:wdwaWB28adeP/deUv80P80Ap8h
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{9167B532-BE5A-413b-BB62-59163F7E2082} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9167B532-BE5A-413b-BB62-59163F7E2082}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9167B532-BE5A-413b-BB62-59163F7E2082}\stubpath = "þÿÿÿX" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2384 2136 rundll32.exe 31 PID 2136 wrote to memory of 2384 2136 rundll32.exe 31 PID 2136 wrote to memory of 2384 2136 rundll32.exe 31 PID 2136 wrote to memory of 2384 2136 rundll32.exe 31 PID 2136 wrote to memory of 2384 2136 rundll32.exe 31 PID 2136 wrote to memory of 2384 2136 rundll32.exe 31 PID 2136 wrote to memory of 2384 2136 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:2384
-