Analysis
-
max time kernel
103s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 15:44
Behavioral task
behavioral1
Sample
JaffaCakes118_8acf5fab7c2f0a4cdd9ca6779d301687.dll
Resource
win7-20240903-en
4 signatures
150 seconds
General
-
Target
JaffaCakes118_8acf5fab7c2f0a4cdd9ca6779d301687.dll
-
Size
532KB
-
MD5
8acf5fab7c2f0a4cdd9ca6779d301687
-
SHA1
aa019cad7991065f33ad272a18937c026ff69a07
-
SHA256
9cf6ceb1b648bcc404201d1f4d69a16bea52f8083f5bda43fbf0442ff85f778d
-
SHA512
974bde194dd990661b0608198254676442779d98a35fb39d4b17eaa11212725426a9bcff98404c272489b73af9895d8a49f4d270e86fabe8e0f0d8880d6af39a
-
SSDEEP
12288:7lhji6zuyUD3XCgI6Cm9TrlRppICzpuCjpQ9OVP9KmlW:7lhmCuyk3XZRoC8CYON9fM
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2968-0-0x0000000010000000-0x00000000101AB000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\shell rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\shell\open rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\shell\open\command\ = "rundll32.exe c:\\windows\\staticial\\cmss.jyc,scanMiddle" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.\shell\open\command\ = "rundll32.exe c:\\progra~1.\\staticial\\cmss.jyc,scanMiddle" rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\. rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3932 wrote to memory of 2968 3932 rundll32.exe 86 PID 3932 wrote to memory of 2968 3932 rundll32.exe 86 PID 3932 wrote to memory of 2968 3932 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8acf5fab7c2f0a4cdd9ca6779d301687.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8acf5fab7c2f0a4cdd9ca6779d301687.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2968
-