Analysis
-
max time kernel
92s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 08:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_034dcf3eae831d7b6ff47a015533c05f.dll
Resource
win7-20240729-en
windows7-x64
4 signatures
150 seconds
General
-
Target
JaffaCakes118_034dcf3eae831d7b6ff47a015533c05f.dll
-
Size
239KB
-
MD5
034dcf3eae831d7b6ff47a015533c05f
-
SHA1
f43620ee0419f85de4587a13321f40c2120128f0
-
SHA256
34c87cd5440425f461158ff0303406865d0cc31e9ad8c20e136f2ac75a6e247a
-
SHA512
9df6af13c3d44fa9413543dcc22dd969ec3164f040265a6278161628f7f140d9968c0e059040c702e43600b9d9830b2a8875da230510e640d6850485aafd035c
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0j:jDgtfRQUHPw06MoV2nwTBlhm87
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5068 wrote to memory of 1440 5068 rundll32.exe 84 PID 5068 wrote to memory of 1440 5068 rundll32.exe 84 PID 5068 wrote to memory of 1440 5068 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_034dcf3eae831d7b6ff47a015533c05f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_034dcf3eae831d7b6ff47a015533c05f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1440
-