Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08407f237626cdebd916ebc12bf704aa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jnlux.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jnlux.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/jnlux.dll
-
Size
152KB
-
MD5
0b1a475c07c822fbedd44f9822b1d5d5
-
SHA1
9eecb7b904311e1f29e8db00c523d1cd03b3c6ac
-
SHA256
a6a4dccd18e10c3569e0cd74def460a7c9f2f137b5d60b3e9a4636bb3cdbd277
-
SHA512
05b28b3e732539ed73fa5946992f9d273179dd271b5a0e75772222f6d946fe4870e0a111013b5035b0f70bbb77e336150cc42c183133132f17353093c0fb7712
-
SSDEEP
3072:GP9t6F0XY0MpiO5YvJq7rVC2+FG/3s0V2/N:CDM0Kp73MGK/N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1996 1732 rundll32.exe 30 PID 1732 wrote to memory of 1996 1732 rundll32.exe 30 PID 1732 wrote to memory of 1996 1732 rundll32.exe 30 PID 1732 wrote to memory of 1996 1732 rundll32.exe 30 PID 1732 wrote to memory of 1996 1732 rundll32.exe 30 PID 1732 wrote to memory of 1996 1732 rundll32.exe 30 PID 1732 wrote to memory of 1996 1732 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jnlux.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jnlux.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1996
-