Analysis
-
max time kernel
103s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 23:55
General
-
Target
JaffaCakes118_b2f68e3af73b7c960f072b554bef3617.dll
-
Size
48KB
-
MD5
b2f68e3af73b7c960f072b554bef3617
-
SHA1
c41c30fada0e4b6b0ffae1646b1a0788ad9df7af
-
SHA256
bac3368552ae80072f5b475772a5d3872bdeeee9f90048ae552083dccd71f2f6
-
SHA512
ba0fbd894d40d9d28d7dacc2757b1f8b95cf94f06aa1952bda62e3e683652b3110e1744493d13180ed6afc3bc3171333ee93e14fcf9e83a2fed480df9d8f5e77
-
SSDEEP
1536:zd0WUGhPmBIrsqARrGbgTrfx0xuQYLMnP4N:ze6ZLWrG0SWsP4
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/4528-0-0x0000000010000000-0x0000000010035000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 4528 404 rundll32.exe 86 PID 404 wrote to memory of 4528 404 rundll32.exe 86 PID 404 wrote to memory of 4528 404 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2f68e3af73b7c960f072b554bef3617.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b2f68e3af73b7c960f072b554bef3617.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4528
-