Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 06:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_14839615db4b261d73f21e05d63a2624.dll
Resource
win7-20241010-en
windows7-x64
4 signatures
150 seconds
General
-
Target
JaffaCakes118_14839615db4b261d73f21e05d63a2624.dll
-
Size
306KB
-
MD5
14839615db4b261d73f21e05d63a2624
-
SHA1
47b2670d7d3dcc52572844e7c8f0a720c4be7790
-
SHA256
29eb9ab17a6eab29731b74b48b6d9a2809818d4ee4892ba362b31c7d4a072b2e
-
SHA512
577ede8b9cf330e32f37ef349e2503b57184185ec9e6b8edbd6685c04f32caace7b85a7797cb81a0939d95c13f6d2a18c25891108968c6e0386cc7f39add83e5
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q08:jDgtfRQUHPw06MoV2nwTBlhm8E
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 3564 4240 rundll32.exe 83 PID 4240 wrote to memory of 3564 4240 rundll32.exe 83 PID 4240 wrote to memory of 3564 4240 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_14839615db4b261d73f21e05d63a2624.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_14839615db4b261d73f21e05d63a2624.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3564
-