Analysis
-
max time kernel
104s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 18:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
JaffaCakes118_90fcd40d87075232b1eca2a5557bda02.dll
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
JaffaCakes118_90fcd40d87075232b1eca2a5557bda02.dll
-
Size
416KB
-
MD5
90fcd40d87075232b1eca2a5557bda02
-
SHA1
aa59b45606d57ac2d18456bd28ee5bcacafc42e9
-
SHA256
2b5f5f7917fb23c4b05b289ddc1137910f8930989432b7c9e64520d6d181bd85
-
SHA512
67259500df4fd04667e72ea482d1ad8ca90c3f936a6e884b1a1fec378e2eb7c42c5bb2a975889873f74318692624ea59e27291bebaf36850095d695af3ec13e7
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0X:jDgtfRQUHPw06MoV2nwTBlhm8/
Malware Config
Signatures
-
Yunsip family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4724 wrote to memory of 1976 4724 rundll32.exe 87 PID 4724 wrote to memory of 1976 4724 rundll32.exe 87 PID 4724 wrote to memory of 1976 4724 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90fcd40d87075232b1eca2a5557bda02.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_90fcd40d87075232b1eca2a5557bda02.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1976
-