Overview
overview
10Static
static
3JaffaCakes...11.exe
windows10-2004-x64
8ADVPACK.dll
windows10-2004-x64
3W95INF16.dll
windows10-2004-x64
1W95INF32.dll
windows10-2004-x64
3fngrprnt.dll
windows10-2004-x64
3msnphoto.scr
windows10-2004-x64
3msvcr71.dll
windows10-2004-x64
3pibase.dll
windows10-2004-x64
3pidav.dll
windows10-2004-x64
3piorg.dll
windows10-2004-x64
3piorgres.dll
windows10-2004-x64
1pisync.dll
windows10-2004-x64
3pisynctw.exe
windows10-2004-x64
3piview.dll
windows10-2004-x64
3slides~1.js
windows10-2004-x64
10startup.js
windows10-2004-x64
3unicows.dll
windows10-2004-x64
3Analysis
-
max time kernel
103s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250502-en -
resource tags
arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2025, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_067352f5a9f5905b21b82b18e9fa2711.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
ADVPACK.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
W95INF16.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
W95INF32.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral5
Sample
fngrprnt.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral6
Sample
msnphoto.scr
Resource
win10v2004-20250502-en
Behavioral task
behavioral7
Sample
msvcr71.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral8
Sample
pibase.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral9
Sample
pidav.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral10
Sample
piorg.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral11
Sample
piorgres.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral12
Sample
pisync.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral13
Sample
pisynctw.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral14
Sample
piview.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral15
Sample
slides~1.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral16
Sample
startup.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral17
Sample
unicows.dll
Resource
win10v2004-20250502-en
General
-
Target
unicows.dll
-
Size
239KB
-
MD5
e1102cedf0c818984c2aca2a666d4c5f
-
SHA1
d8d88ea7083aee9c40f6fdc6c56451a018d21a83
-
SHA256
22f23cc65698741184ec34f46e6f69717644e0b5aabf5d5bd015101f2d72e56e
-
SHA512
e58b35815801d6d3797f95c986834d2ca5450ccc3f1fa1d27d127a8d1d36f8e21279173715a00686c9c831d22d7c5b5b9cc5874170223a4d78f09c4eefa390a2
-
SSDEEP
3072:fEWAQKw38JvCAib0uT++ICSQ6UOX/mQhYQXS0FsmaiUZZynGJ5x/59XH7PMYV1Nz:qwgvCAib0PAOOQhS0/s5x/R1PkOFB5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3140 wrote to memory of 5472 3140 rundll32.exe 86 PID 3140 wrote to memory of 5472 3140 rundll32.exe 86 PID 3140 wrote to memory of 5472 3140 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\unicows.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\unicows.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5472
-