Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 10:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_646e6e642b6b0d585f4effa5518b60db.dll
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
General
-
Target
JaffaCakes118_646e6e642b6b0d585f4effa5518b60db.dll
-
Size
330KB
-
MD5
646e6e642b6b0d585f4effa5518b60db
-
SHA1
c6ab908ef380c86ba6298f1102d719c4e1f09f6f
-
SHA256
f9f4173476445be2477c1da7afacf24c246d6e9eddaa719a05b0f5fcb19e0c76
-
SHA512
d0a6db56bc59b25bf4c1ad2e93154e403c44e377454f80fb1880ff8fab241d5d6315a4b9aa806c7a9376ef98966f6afb64b5bf4e0b638be241aacfff8248309f
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0s:jDgtfRQUHPw06MoV2nwTBlhm80
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1668 2272 rundll32.exe 83 PID 2272 wrote to memory of 1668 2272 rundll32.exe 83 PID 2272 wrote to memory of 1668 2272 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_646e6e642b6b0d585f4effa5518b60db.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_646e6e642b6b0d585f4effa5518b60db.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1668
-