Analysis
-
max time kernel
105s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 17:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_8c9aab98311135cf45e48c455b0c679f.dll
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
JaffaCakes118_8c9aab98311135cf45e48c455b0c679f.dll
-
Size
405KB
-
MD5
8c9aab98311135cf45e48c455b0c679f
-
SHA1
49971a374d88a34aba664b33b3d12dd63437e853
-
SHA256
8bb59767f80c1dd0b9f03f0eb11a42df1d020104ffb29234ba2cbac8a04a1ed3
-
SHA512
98810b59b6a5e050208ea2786f3bbf5ffd223f702a0e7f35174ac8ba42d6a133585f2c476963f76511c6cf23a80d8baad20788be1a8ef6fdfd2d2d11d8f60bcb
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0h:jDgtfRQUHPw06MoV2nwTBlhm8Z
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2320 2144 rundll32.exe 86 PID 2144 wrote to memory of 2320 2144 rundll32.exe 86 PID 2144 wrote to memory of 2320 2144 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c9aab98311135cf45e48c455b0c679f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c9aab98311135cf45e48c455b0c679f.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2320
-