Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 12:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9b6d2a2a3033be2c1e87fd39d35450c0_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
9b6d2a2a3033be2c1e87fd39d35450c0_JaffaCakes118.dll
-
Size
353KB
-
MD5
9b6d2a2a3033be2c1e87fd39d35450c0
-
SHA1
091b44fc760055448b2e07247644a17692e1f62d
-
SHA256
290a9efc4fdd998fd8e30fe0c001f44c2aa698efea9f643ea63bca6eff8a5e4f
-
SHA512
68bcde0b6e9e4deb4e0fe351373e05d4c69bfec301f9d90c96e338f236ba9613c54abb55192d8a8c20af46ebc099fd052c51c68f07a0caa33cff02a8ca24aec2
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0Y:jDgtfRQUHPw06MoV2nwTBlhm8A
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3904 wrote to memory of 1700 3904 rundll32.exe 82 PID 3904 wrote to memory of 1700 3904 rundll32.exe 82 PID 3904 wrote to memory of 1700 3904 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b6d2a2a3033be2c1e87fd39d35450c0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9b6d2a2a3033be2c1e87fd39d35450c0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1700
-