Analysis
-
max time kernel
92s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 20:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f07caa32ec3030e24d204eac07b1ba6f_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
f07caa32ec3030e24d204eac07b1ba6f_JaffaCakes118.dll
-
Size
239KB
-
MD5
f07caa32ec3030e24d204eac07b1ba6f
-
SHA1
1ad3eeea6c9aa36a68641e5b2a80d4c92f3bf33b
-
SHA256
a8955e32720768837c8da18362ffd36583ded63dd00bbb4ce8947f3cfe235243
-
SHA512
57f68761c427300fffa597a0b7ea7e3e4c382d4260157206170200ef0e7291b7e075d1d0da69c0649fa68bde505b00e6ae73e14c8102659e8fe8a009b999ef5e
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0Q:jDgtfRQUHPw06MoV2nwTBlhm8I
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 416 wrote to memory of 4840 416 rundll32.exe 81 PID 416 wrote to memory of 4840 416 rundll32.exe 81 PID 416 wrote to memory of 4840 416 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f07caa32ec3030e24d204eac07b1ba6f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f07caa32ec3030e24d204eac07b1ba6f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4840
-