Analysis
-
max time kernel
94s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 05:32
Behavioral task
behavioral1
Sample
JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll
-
Size
122KB
-
MD5
5d51d749bd50bdfb08ca61c88818b570
-
SHA1
74643213faec1d2764e7ff6be4eb6c0f32bcff63
-
SHA256
883ebe97dd59f17235c08dcfb4431963ef2c50c0ab2cb53591d490ea095da5c5
-
SHA512
4441ca12ff824ce753dff330501d5d86fca15736294eae314d6af995c9f379c4926544e3a59da9e2e495d1c40f2fc341d21280a4c856c946265b05d3c4b083b4
-
SSDEEP
3072:of9xHwm1PXBmXZFeA28pMGEdePl9dehiv80P80Cnp8d6a:wdwaWB28adeP/deUv80P80Ap8h
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{9167B532-BE5A-413b-BB62-59163F7E2082} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9167B532-BE5A-413b-BB62-59163F7E2082}\ = "ϵͳÉèÖÃ" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9167B532-BE5A-413b-BB62-59163F7E2082}\stubpath rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2660 wrote to memory of 864 2660 rundll32.exe 83 PID 2660 wrote to memory of 864 2660 rundll32.exe 83 PID 2660 wrote to memory of 864 2660 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d51d749bd50bdfb08ca61c88818b570.dll,#12⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:864
-