Analysis
-
max time kernel
103s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 23:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_b2f5f261835390a2fa475d66bf033d80.dll
Resource
win10v2004-20250314-en
4 signatures
150 seconds
General
-
Target
JaffaCakes118_b2f5f261835390a2fa475d66bf033d80.dll
-
Size
340KB
-
MD5
b2f5f261835390a2fa475d66bf033d80
-
SHA1
efd52b776f2e0500e2a4fe9d37ff800b9a81f6b5
-
SHA256
23c7ba39d53c433d6b7d28b3986dca145be4391e39541a922617cc8aea86b2a8
-
SHA512
eb44bde9c0f604ed5bf4e4dbe7b80e65c3af567db3186d59e9bf7af89a775c7adb4b4073202d6775cc444e4566b9dd33cb8a75ac3a0fb3042af546a702679c3f
-
SSDEEP
6144:mGooGzCqO4g24u+Qz5WSFx39oZb1dL/WhN:rGzBa24JMLando
Score
10/10
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\bxlrvps = "{6943E868-FAE2-4202-AC90-D7A2111FF36F}" rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6943E868-FAE2-4202-AC90-D7A2111FF36F}\InProcServer32 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6943E868-FAE2-4202-AC90-D7A2111FF36F} rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6943E868-FAE2-4202-AC90-D7A2111FF36F}\InProcServer32\ = "C:\\Windows\\bxlrvps.dll" rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 964 wrote to memory of 5464 964 rundll32.exe 86 PID 964 wrote to memory of 5464 964 rundll32.exe 86 PID 964 wrote to memory of 5464 964 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2f5f261835390a2fa475d66bf033d80.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2f5f261835390a2fa475d66bf033d80.dll,#12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5464
-