Overview
overview
10Static
static
10JaffaCakes...63.exe
windows10-2004-x64
10JaffaCakes...63.exe
windows11-21h2-x64
10$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows11-21h2-x64
3AKL.chm
windows10-2004-x64
1AKL.chm
windows11-21h2-x64
1AKL.exe
windows10-2004-x64
6AKL.exe
windows11-21h2-x64
6AKV.exe
windows10-2004-x64
3AKV.exe
windows11-21h2-x64
3Uninstall.exe
windows10-2004-x64
7Uninstall.exe
windows11-21h2-x64
7il.dll
windows10-2004-x64
3il.dll
windows11-21h2-x64
3kh.dll
windows10-2004-x64
3kh.dll
windows11-21h2-x64
3qs.html
windows10-2004-x64
4qs.html
windows11-21h2-x64
7Analysis
-
max time kernel
103s -
max time network
105s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/04/2025, 04:43
Behavioral task
behavioral1
Sample
JaffaCakes118_bca126cc681c07440b291fe71f5ab863.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bca126cc681c07440b291fe71f5ab863.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20250410-en
Behavioral task
behavioral5
Sample
AKL.chm
Resource
win10v2004-20250410-en
Behavioral task
behavioral6
Sample
AKL.chm
Resource
win11-20250410-en
Behavioral task
behavioral7
Sample
AKL.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
AKL.exe
Resource
win11-20250411-en
Behavioral task
behavioral9
Sample
AKV.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral10
Sample
AKV.exe
Resource
win11-20250410-en
Behavioral task
behavioral11
Sample
Uninstall.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral12
Sample
Uninstall.exe
Resource
win11-20250410-en
Behavioral task
behavioral13
Sample
il.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
il.dll
Resource
win11-20250410-en
Behavioral task
behavioral15
Sample
kh.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral16
Sample
kh.dll
Resource
win11-20250410-en
Behavioral task
behavioral17
Sample
qs.html
Resource
win10v2004-20250410-en
Behavioral task
behavioral18
Sample
qs.html
Resource
win11-20250410-en
General
-
Target
kh.dll
-
Size
4KB
-
MD5
c0aec89e4dc32fb0455b5ba72ab60bcf
-
SHA1
810895f5aec20559c76e1139d91f964235234539
-
SHA256
ebac4c23d288b3714702b907be613c94a8611fcac6cec78c2b1bfc9833c3c051
-
SHA512
cfd86c5561dbb695bdd934c39b298d12269a6571799dd8b2c1eb3ce8904c5c4afc0958a505882d2b38c7d973703042585fa8eb9ff928f143335d3f808aece4ab
-
SSDEEP
48:CjknnZJH2mxnV2Vh2X7uVlAKfo+OAO05+AAY3tZJ4nix:OknDrv23e6AKfhO7k+AAmZJ4n
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2528 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5840 wrote to memory of 2528 5840 rundll32.exe 78 PID 5840 wrote to memory of 2528 5840 rundll32.exe 78 PID 5840 wrote to memory of 2528 5840 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\kh.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\kh.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2528
-