Analysis
-
max time kernel
104s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 16:09
Behavioral task
behavioral1
Sample
JaffaCakes118_98e55559bf544f9792522047dfa31489.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
JaffaCakes118_98e55559bf544f9792522047dfa31489.dll
-
Size
16KB
-
MD5
98e55559bf544f9792522047dfa31489
-
SHA1
246711c58626cf2d7fa60e907bb7c090dd634c33
-
SHA256
619b6e3c1ad65e63a23be98f9029e08a10295b3b3710c6635f17914ac2fd3657
-
SHA512
449aa96a3d37b8c13fb80832190a1dd040eaf89668184d4e1d833d137ff8bb4dfc15d624e0ffa1d9db717af37144c0f429a573895bb20b7127c0a9cde8492cf3
-
SSDEEP
192:AT87CfMixNyK35giWuwEd2SLWVSHKzbgeN3BS3OWoa4v0E3Ftm/bXvn06QfKDRgQ:Arf9xNYPw76DHdU+Wo53F0/bXv0gNHnX
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5756-0-0x0000000010000000-0x0000000010012000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5148 wrote to memory of 5756 5148 rundll32.exe 86 PID 5148 wrote to memory of 5756 5148 rundll32.exe 86 PID 5148 wrote to memory of 5756 5148 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e55559bf544f9792522047dfa31489.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e55559bf544f9792522047dfa31489.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5756
-