Overview
overview
10Static
static
10JaffaCakes...63.exe
windows10-2004-x64
10JaffaCakes...63.exe
windows11-21h2-x64
10$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows11-21h2-x64
3AKL.chm
windows10-2004-x64
1AKL.chm
windows11-21h2-x64
1AKL.exe
windows10-2004-x64
6AKL.exe
windows11-21h2-x64
6AKV.exe
windows10-2004-x64
3AKV.exe
windows11-21h2-x64
3Uninstall.exe
windows10-2004-x64
7Uninstall.exe
windows11-21h2-x64
7il.dll
windows10-2004-x64
3il.dll
windows11-21h2-x64
3kh.dll
windows10-2004-x64
3kh.dll
windows11-21h2-x64
3qs.html
windows10-2004-x64
4qs.html
windows11-21h2-x64
7Analysis
-
max time kernel
102s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2025, 04:43
Behavioral task
behavioral1
Sample
JaffaCakes118_bca126cc681c07440b291fe71f5ab863.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bca126cc681c07440b291fe71f5ab863.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
AKL.chm
Resource
win10v2004-20250410-en
Behavioral task
behavioral6
Sample
AKL.chm
Resource
win11-20250410-en
Behavioral task
behavioral7
Sample
AKL.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
AKL.exe
Resource
win11-20250411-en
Behavioral task
behavioral9
Sample
AKV.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral10
Sample
AKV.exe
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
Uninstall.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral12
Sample
Uninstall.exe
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
il.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
il.dll
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
kh.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral16
Sample
kh.dll
Resource
win11-20250410-en
Behavioral task
behavioral17
Sample
qs.html
Resource
win10v2004-20250410-en
Behavioral task
behavioral18
Sample
qs.html
Resource
win11-20250410-en
General
-
Target
il.dll
-
Size
6KB
-
MD5
00fb53e770ee66150b83c605f5b559ec
-
SHA1
a1a0bb6a9ee2ddbfaae9ac1b470961d6fb47e8e5
-
SHA256
1686ec9eddb4549cb12f5b115ab1d55d57b4b0d53c4995284f8f747a633acceb
-
SHA512
c0e9ca2aebd5ec3bcef4208f4f92f1c25d94502af1b56d970ebfccb703fcb29deff789b8c12e6f3ce09e37756baa14b82116ea0315f2f35e0a349151d0c54e26
-
SSDEEP
96:U29JuAtmDs5VboiM1LgDLkAYhdvvJ969J0Hsb6HPnf:UhAtmYnkiMKDLkd/az6IsPf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2132 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 2132 3344 rundll32.exe 85 PID 3344 wrote to memory of 2132 3344 rundll32.exe 85 PID 3344 wrote to memory of 2132 3344 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\il.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\il.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2132
-