Overview
overview
10Static
static
3JaffaCakes...23.exe
windows7-x64
3JaffaCakes...23.exe
windows10-2004-x64
10$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3UKHook40.dll
windows7-x64
3UKHook40.dll
windows10-2004-x64
3UniKey.exe
windows7-x64
3UniKey.exe
windows10-2004-x64
3ukfaq.htm
windows7-x64
3ukfaq.htm
windows10-2004-x64
3ukmanual.htm
windows7-x64
3ukmanual.htm
windows10-2004-x64
3uninst.exe
windows7-x64
3uninst.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 18:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ae2e1cbf8477077d682a9e7882e80023.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ae2e1cbf8477077d682a9e7882e80023.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
UKHook40.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
UKHook40.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
UniKey.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
UniKey.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
ukfaq.htm
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ukfaq.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ukmanual.htm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ukmanual.htm
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
uninst.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
uninst.exe
Resource
win10v2004-20250129-en
General
-
Target
UniKey.exe
-
Size
204KB
-
MD5
3246d74d15fcf3d3da7bb58fad497321
-
SHA1
72d5fe36502611cc1f37625a58540122bc4d3401
-
SHA256
43db554d9f75bbf012035232ca21869c02a98fcee8c1564c5afbda496e9c0ba5
-
SHA512
5f2130075369b540762f9708904dbb148dec323a35697aead504852e5248919f88c7de06008e1ed11667cb262b929c71b6d4a28792b2cdb93e4378fbe1521536
-
SSDEEP
3072:sbpNtQGgGSTgC3O3pKicj2+cilWma71dTOo0hwV8tAvC1q:sPtQGgGSV3RiIJa71xO3SaA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UniKey.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 UniKey.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 UniKey.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2828 UniKey.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 UniKey.exe 2828 UniKey.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UniKey.exe"C:\Users\Admin\AppData\Local\Temp\UniKey.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2828